We study quantum protocols among two distrustful parties. By adopting a rather strict definition of correctness — guaranteeing that honest players obtain their correct outcomes only — we can show that every strictly correct quantum protocol implementing a non-trivial classical primitive necessarily leaks information to a dishonest player. This extends known impossibility results to all non-trivial primitives. We provide a framework for quantifying this leakage and argue that leakage is a good measure for the privacy provided to the players by a given protocol. Our framework also covers the case where the two players are helped by a trusted third party. We show that despite the help of a trusted third party, the players cannot amplify the cr...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
textabstractQuantum cryptography makes use of the quantum-mechanical behavior of nature for the desi...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cruci...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the securit...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
textabstractQuantum cryptography makes use of the quantum-mechanical behavior of nature for the desi...
We consider the implementation of two-party cryptographic primitives based on the sole assumption th...
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cruci...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
In this thesis, we are interested in the theory of unconditional secure two-party computations of wh...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...