Robust cryptography in the noisy-quantum-storage model
From MaRDI portal
Publication:3400486
zbMATH Open1189.81041arXiv0807.1333MaRDI QIDQ3400486FDOQ3400486
Authors: Christian Schaffner, Barbara M. Terhal, S. Wehner
Publication date: 5 February 2010
Full work available at URL: https://arxiv.org/abs/0807.1333
Recommendations
- Quantum computation and quantum information†
- Quantum computation and cryptography: An overview
- Formalization \textit{of} quantum protocols using Coq
- Quantum hardcore functions by complexity-theoretical quantum list decoding
- The challenge of quantum computing to information security and our countermeasures
Information storage and retrieval of data (68P20) Cryptography (94A60) Quantum algorithms and complexity in the theory of computing (68Q12) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cited In (7)
- A transform of complementary aspects with applications to entropic uncertainty relations
- Two-sided bounds on minimum-error quantum measurement, on the reversibility of quantum dynamics, and on maximum overlap using directional iterates
- Secure identification and QKD in the bounded-quantum-storage model
- Quantum cryptography beyond quantum key distribution
- Quantum cryptography
- Oblivious transfer based on single-qubit rotations
- Title not available (Why is that?)
This page was built for publication: Robust cryptography in the noisy-quantum-storage model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3400486)