International audienceRandom access coding is an information task that has been extensively studied and found many applications in quantum information. In this scenario, Alice receives an n-bit string x, and wishes to encode x into a quantum state ρ x , such that Bob, when receiving the state ρ x , can choose any bit i ∈ [n] and recover the input bit x i with high probability. Here we study a variant called parity-oblivious random access codes, where we impose the cryptographic property that Bob cannot infer any information about the parity of any subset of bits of the input, apart from the single bits x i . We provide the optimal quantum parity-oblivious random access codes and show that they are asymp-totically better than the optimal cla...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
Random access codes have provided many examples of quantum advantage in communication, but concern o...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
International audienceRandom access coding is an information task that has been extensively studied ...
Random Access Codes is an information task that has been extensively studied and found many applicat...
We consider two classes of quantum generalisations of random access code (RAC) and study the bounds ...
International audienceOblivious transfer is a fundamental cryptographic primitive in which Bob trans...
We explore the fundamental origin of the quantum advantage behind random access code. We propose new...
It is known from Bellʼs theorem that quantum predictions for some entangled states cannot be mimicke...
We consider a communication method, where the sender encodes n classical bits into 1 qubit and sends...
Randomness extractors are an important building block for classical and quantum cryptography. Howeve...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
Random access code (RAC) is an important communication task to conditionally access remote $n$-bit s...
© 2018 Copyright held by the owner/author(s). We consider the problem of implementing two-party inte...
We investigate how a classical private key can be used by two players, connected by an insecure one-...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
Random access codes have provided many examples of quantum advantage in communication, but concern o...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
International audienceRandom access coding is an information task that has been extensively studied ...
Random Access Codes is an information task that has been extensively studied and found many applicat...
We consider two classes of quantum generalisations of random access code (RAC) and study the bounds ...
International audienceOblivious transfer is a fundamental cryptographic primitive in which Bob trans...
We explore the fundamental origin of the quantum advantage behind random access code. We propose new...
It is known from Bellʼs theorem that quantum predictions for some entangled states cannot be mimicke...
We consider a communication method, where the sender encodes n classical bits into 1 qubit and sends...
Randomness extractors are an important building block for classical and quantum cryptography. Howeve...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
Random access code (RAC) is an important communication task to conditionally access remote $n$-bit s...
© 2018 Copyright held by the owner/author(s). We consider the problem of implementing two-party inte...
We investigate how a classical private key can be used by two players, connected by an insecure one-...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
Random access codes have provided many examples of quantum advantage in communication, but concern o...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...