The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party ...
The noisy-storage model allows the implementation of secure two-party protocols under the sole assum...
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of se...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks wi...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
This progress report presents the scientic results obtained in part A of my PhD studies at BRICS. We...
The noisy-storage model allows the implementation of secure two-party protocols under the sole assum...
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of se...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks wi...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
This progress report presents the scientic results obtained in part A of my PhD studies at BRICS. We...
The noisy-storage model allows the implementation of secure two-party protocols under the sole assum...
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of se...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...