This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols. The first primitive is ``quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the two players. We study this primitive when the two players can only create quantum Gaussian states and perform Gaussian operations. These operations are a subset of what is allowed by quantum physics, and plays a central role in quantum optics. Hence, it ...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
This dissertation studies two different aspects of two-player interaction in the model of quantum co...
This dissertation studies two different aspects of two-player interaction in the model of quantum co...
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la c...
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la c...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
In this thesis, we study networks of entangled quantum optical systems at different degrees of compl...
In this thesis, we study networks of entangled quantum optical systems at different degrees of compl...
Quantum computers promise surprising powers of computation by exploiting the stunning physical prope...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
This dissertation studies two different aspects of two-player interaction in the model of quantum co...
This dissertation studies two different aspects of two-player interaction in the model of quantum co...
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la c...
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la c...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
In this thesis, we study networks of entangled quantum optical systems at different degrees of compl...
In this thesis, we study networks of entangled quantum optical systems at different degrees of compl...
Quantum computers promise surprising powers of computation by exploiting the stunning physical prope...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...