In this work, we propose a novel architecture (and several variants thereof) based on quantum cryptographic primitives with provable privacy and security guarantees regarding membership inference attacks on generative models. Our architecture can be used on top of any existing classical or quantum generative models. We argue that the use of quantum gates associated with unitary operators provides inherent advantages compared to standard Differential Privacy based techniques for establishing guaranteed security from all polynomial-time adversaries
We establish a converse bounds on the private transmission capabilities of a quantum channel. The ma...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Quantum algorithms for solving a wide range of practical problems have been proposed in the last ten...
Recently, quantum classifiers have been known to be vulnerable to adversarial attacks, where quantum...
Differential privacy has been an exceptionally successful concept when it comes to providing provabl...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid featu...
(Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an...
Privacy amplification is the key step to guarantee the security of quantum communication. The existi...
© 2017 IEEE. More and more quantum algorithms have been designed for solving problems in machine lea...
We show that three principle means of treating privacy amplification in quantum key distribution, pr...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
of any of the information contained in it must acknowledge this thesis as the source of the quotatio...
By sending systems in specially prepared quantum states, two parties can communicate without an eave...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
We establish a converse bounds on the private transmission capabilities of a quantum channel. The ma...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Quantum algorithms for solving a wide range of practical problems have been proposed in the last ten...
Recently, quantum classifiers have been known to be vulnerable to adversarial attacks, where quantum...
Differential privacy has been an exceptionally successful concept when it comes to providing provabl...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid featu...
(Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an...
Privacy amplification is the key step to guarantee the security of quantum communication. The existi...
© 2017 IEEE. More and more quantum algorithms have been designed for solving problems in machine lea...
We show that three principle means of treating privacy amplification in quantum key distribution, pr...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
of any of the information contained in it must acknowledge this thesis as the source of the quotatio...
By sending systems in specially prepared quantum states, two parties can communicate without an eave...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
We establish a converse bounds on the private transmission capabilities of a quantum channel. The ma...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Quantum algorithms for solving a wide range of practical problems have been proposed in the last ten...