Cryptography in the Bounded-Quantum-Storage Model
From MaRDI portal
Publication:3549326
DOI10.1137/060651343zbMATH Open1156.81336OpenAlexW2125529777MaRDI QIDQ3549326FDOQ3549326
Authors: Serge Fehr, Louis Salvail, Christian Schaffner, Ivan B. Damgård
Publication date: 22 December 2008
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/060651343
Recommendations
quantum cryptographyoblivious transferbit commitmentquantum uncertainty relationquantum-bounded-storage model
Cited In (46)
- Composable Security in the Bounded-Quantum-Storage Model
- Simple schemes in the bounded storage model
- Entropy accumulation
- Near-optimal extractors against quantum storage
- Uncertainty relation of quantum coherence measure based on Hellinger distance
- Long term confidentiality: a survey
- Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol
- Title not available (Why is that?)
- Conditional entropic uncertainty relations for Tsallis entropies
- Improving the Security of Quantum Protocols via Commit-and-Open
- A novel application of probabilistic teleportation: \(p\)-Rabin quantum oblivious transfer of a qubit
- Quantum key recycling with 8-state encoding (The quantum one-time pad is more interesting than we thought)
- Stronger variance-based unitary uncertainty relations
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Constructive post-quantum reductions
- Adaptive versus non-adaptive strategies in the quantum setting with applications
- A game-theoretic security framework for quantum cryptography: performance analysis and application
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- A new framework for quantum oblivious transfer
- Preface
- Long-term security and universal composability
- Secure multiparty computation in the bounded storage model
- Stronger uncertainty relations based on Wigner-Yanase skew information with refined sequence
- Title not available (Why is that?)
- Semi-quantum cryptography
- Preface
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- Black-hole radiation decoding is quantum cryptography
- How to Verify a Quantum Computation
- Randomized quantum oblivious transfer with application in hacker-resistant computation
- Secure identification and QKD in the bounded-quantum-storage model
- Oblivious transfer is in MiniQCrypt
- On the Power of Quantum Memory
- Uncertainty, joint uncertainty, and the quantum uncertainty principle
- Quantum cryptography beyond quantum key distribution
- Quantum cryptography
- Quantum oblivious transfer with relaxed constraints on the receiver
- Memory-sample lower bounds for learning with classical-quantum hybrid memory
- Quantum oblivious transfer: a secure practical implementation
- Local random quantum circuits are approximate polynomial-designs
- Concurrent composition in the bounded quantum storage model
- Cryptanalysis and improvement of a quantum private set intersection protocol
- Single-shot security for one-time memories in the isolated qubits model
- Disappearing cryptography in the bounded storage model
- Title not available (Why is that?)
- Flexible quantum oblivious transfer
This page was built for publication: Cryptography in the Bounded-Quantum-Storage Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3549326)