Quantum mechanical effects have enabled the construction of cryptographic primitives that are impossible classically. For example, quantum copy-protection allows for a program to be encoded in a quantum state in such a way that the program can be evaluated, but not copied. Many of these cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob. In this work, we show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem. In particular, this means that all communication between (classical) Alice and (quantum) Bob is...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
In this dissertation, we solve two open questions. First, can the output of a quantum computation be...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
50 pages, 3 figures, function construction in Section 6 corrected and other small changesInternation...
Assume that Alice can do only classical probabilistic polynomial-time computing while Bob can do qua...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We present a quantumly-enhanced protocol to achieve unconditionally secure delegated clas-sical comp...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
We introduce a Quantum Key Recycling (QKR) protocol that needs no classical communication from Alice...
Bob is stuck doing a crossword puzzle and is starting to think that the puzzle is impossible to comp...
In the quantum computation verification problem, a quantum server wants to convince a client that th...
International audienceProperties of quantum mechanics have enabled the emergence of quantum cryptogr...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
In this dissertation, we solve two open questions. First, can the output of a quantum computation be...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
50 pages, 3 figures, function construction in Section 6 corrected and other small changesInternation...
Assume that Alice can do only classical probabilistic polynomial-time computing while Bob can do qua...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We present a quantumly-enhanced protocol to achieve unconditionally secure delegated clas-sical comp...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
We introduce a Quantum Key Recycling (QKR) protocol that needs no classical communication from Alice...
Bob is stuck doing a crossword puzzle and is starting to think that the puzzle is impossible to comp...
In the quantum computation verification problem, a quantum server wants to convince a client that th...
International audienceProperties of quantum mechanics have enabled the emergence of quantum cryptogr...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
In this dissertation, we solve two open questions. First, can the output of a quantum computation be...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...