We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w as possible - the adversary can exclude at most one possible password for each execution. We propose a solution in the bounded-quantum-storage model, where U and S may exchange qubits, and a dishonest party is assumed to have limited quantum memory. No other restriction is posed upon the adversary. An improved version of the proposed identification scheme is also secure against a man-in-the-middle attack, but requires U and S to additionally share a high-entropy key k. However, security is still guaranteed if one party loses k to the attacker but notices the loss....
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
We study the problem of authentication based on a weak key in the information-theoretic setting. A k...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
Previously, we demonstrated that cryptographic primitives can be implemented based on the assumption...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
We study the problem of authentication based on a weak key in the information-theoretic setting. A k...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
Abstract. We consider the problem of secure identification: user U proves to server S that he knows ...
We consider the problem of secure identification: user U proves to server S that he knows an agreed ...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
Previously, we demonstrated that cryptographic primitives can be implemented based on the assumption...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that ...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
We show how to implement cryptographic primitives based on the realistic assumption that quantum sto...
We introduce a new quantum identification protocol based on restrictions on the quantum memory avail...
We study the problem of authentication based on a weak key in the information-theoretic setting. A k...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...