We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted. This is in sharp contrast to the classical bounded-memory model, where we can only tolerate adversaries with memory of size quadratic in honest players' memory size. Our protocols are efficient, non-interactive and can be implemented using today's technology. On the technical side, a new entropi...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Secure two-party cryptography is possible if the adversary’s quantum storage device suffers imperfec...
In the bounded storage model the memory of the adversary is restricted, instead of its computational...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
Since its invention in 1984 by C.H. Bennett and G. Brassard, the BB84 protocol has been proven secur...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
Cryptographic primitives such as oblivious transfer and bit commitment are impossible to realize if ...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Secure two-party cryptography is possible if the adversary’s quantum storage device suffers imperfec...
In the bounded storage model the memory of the adversary is restricted, instead of its computational...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
Since its invention in 1984 by C.H. Bennett and G. Brassard, the BB84 protocol has been proven secur...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...