Abstract. We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w as possible, namely the adversary can exclude at most one possible password for each execution of the scheme. We propose a solution in the bounded-quantum-storage model, where U and S may exchange qubits, and a dishonest party is assumed to have limited quantum memory. No other restriction is posed upon the adversary. An improved version of the proposed identification scheme is also secure against a man-in-the-middle attack, but requires U and S to additionally share a high-entropy key k. However, security is still guaranteed if one party loses k to the ...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
Previously, we demonstrated that cryptographic primitives can be implemented based on the assumption...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
Previously, we demonstrated that cryptographic primitives can be implemented based on the assumption...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...