Transitioning organizations to post-quantum cryptography
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …
Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Universal blind quantum computation
A Broadbent, J Fitzsimons… - 2009 50th annual IEEE …, 2009 - ieeexplore.ieee.org
We present a protocol which allows a client to have a server carry out a quantum
computation for her such that the client's inputs, outputs and computation remain perfectly …
computation for her such that the client's inputs, outputs and computation remain perfectly …
Quantum cryptography beyond quantum key distribution
A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
[图书][B] Quantum computing: A gentle introduction
EG Rieffel, WH Polak - 2011 - books.google.com
A thorough exposition of quantum computing and the underlying concepts of quantum
physics, with explanations of the relevant mathematics and numerous examples. The …
physics, with explanations of the relevant mathematics and numerous examples. The …
Nonbinary stabilizer codes over finite fields
A Ketkar, A Klappenecker, S Kumar… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
One formidable difficulty in quantum communication and computation is to protect
information-carrying quantum states against undesired interactions with the environment. To …
information-carrying quantum states against undesired interactions with the environment. To …
Quantum digital signatures
D Gottesman, I Chuang - arXiv preprint quant-ph/0105032, 2001 - arxiv.org
We present a quantum digital signature scheme whose security is based on fundamental
principles of quantum physics. It allows a sender (Alice) to sign a message in such a way …
principles of quantum physics. It allows a sender (Alice) to sign a message in such a way …
Verification of quantum computation: An overview of existing approaches
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …
for classical computers, but also problems for which verifying the solution is also considered …
Unconditionally verifiable blind quantum computation
JF Fitzsimons, E Kashefi - Physical Review A, 2017 - APS
Blind quantum computing (BQC) allows a client to have a server carry out a quantum
computation for them such that the client's input, output, and computation remain private. A …
computation for them such that the client's input, output, and computation remain private. A …