A theorem is proved which states that no classical key generating protocol could ever be provably secure. To illustrate this result it has been shown that a provably secure protocol, previously thought to be classical, is in fact a very sophisticated quantum protocol
A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assum...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
If we combine two secure cryptographic systems, is the resulting system still secure? Answering this...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cruci...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
We prove the security of theoretical quantum key distribution against the most general attacks which...
AbstractWe prove that quantum key distribution is secure against several types of attacks within the...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerable to a class...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assum...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
If we combine two secure cryptographic systems, is the resulting system still secure? Answering this...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cruci...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
We prove the security of theoretical quantum key distribution against the most general attacks which...
AbstractWe prove that quantum key distribution is secure against several types of attacks within the...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerable to a class...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assum...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
If we combine two secure cryptographic systems, is the resulting system still secure? Answering this...