We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system -- in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a c...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
A theorem is proved which states that no classical key generating protocol could ever be provably se...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bi...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider a quantum system subject to superselection rules, for which certain restrictions apply t...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
After a general introduction, the thesis is divided into four parts. In the first, we discuss the ta...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
46 pagesInternational audienceIt is of folkloric belief that the security of classical cryptographic...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed fi...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
A theorem is proved which states that no classical key generating protocol could ever be provably se...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bi...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider a quantum system subject to superselection rules, for which certain restrictions apply t...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
After a general introduction, the thesis is divided into four parts. In the first, we discuss the ta...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
46 pagesInternational audienceIt is of folkloric belief that the security of classical cryptographic...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed fi...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
A theorem is proved which states that no classical key generating protocol could ever be provably se...