Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-o...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
<p>Cryptographic protocols are the backbone of our information society. This includes two-party prot...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In recent years, quantum cryptography has been developed into the continuous variable framework wher...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In this work we study quantum position verification with continuous-variable quantum states. In cont...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We introduce new quantum key distribution protocols using quantum continuous variables, that are sec...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We discuss quantum key distribution protocols using quantum continuous variables. We show that such ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that q...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
<p>Cryptographic protocols are the backbone of our information society. This includes two-party prot...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In recent years, quantum cryptography has been developed into the continuous variable framework wher...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In this work we study quantum position verification with continuous-variable quantum states. In cont...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We introduce new quantum key distribution protocols using quantum continuous variables, that are sec...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We discuss quantum key distribution protocols using quantum continuous variables. We show that such ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that q...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...