Search Results - "Broadbent, Anne"
-
1
Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions
Published in New journal of physics (01-05-2023)“…Abstract We present a device-independent protocol for oblivious transfer (DIOT) and analyse its security under the assumption that the receiver’s quantum…”
Get full text
Journal Article -
2
Demonstration of Blind Quantum Computing
Published in Science (American Association for the Advancement of Science) (20-01-2012)“…Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental…”
Get full text
Journal Article -
3
Categorical composable cryptography: extended version
Published in Logical methods in computer science (01-01-2023)“…We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric…”
Get full text
Journal Article -
4
Finite-key security analysis for multilevel quantum key distribution
Published in New journal of physics (14-07-2016)“…We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an…”
Get full text
Journal Article -
5
Quantum Private Information Retrieval has Linear Communication Complexity
Published in Journal of cryptology (01-01-2015)“…In private information retrieval (PIR), a client queries an n -bit database in order to retrieve an entry of her choice, while maintaining privacy of her query…”
Get full text
Journal Article -
6
Algebra of Nonlocal Boxes and the Collapse of Communication Complexity
Published in Quantum (Vienna, Austria) (10-07-2024)“…Communication complexity quantifies how difficult it is for two distant computers to evaluate a function f ( X , Y ) , where the strings X and Y are…”
Get full text
Journal Article -
7
Towards Quantum One-Time Memories from Stateless Hardware
Published in Quantum (Vienna, Austria) (08-04-2021)“…A central tenet of theoretical cryptography is the study of the minimal assumptions required to implement a given cryptographic primitive. One such primitive…”
Get full text
Journal Article -
8
Quantum cryptography beyond quantum key distribution
Published in Designs, codes, and cryptography (01-01-2016)“…Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example…”
Get full text
Journal Article -
9
Extending the Known Region of Nonlocal Boxes that Collapse Communication Complexity
Published in Physical review letters (16-02-2024)“…Nonsignaling boxes (NS) are theoretical resources defined by the principle of no-faster-than-light communication. They generalize quantum correlations and some…”
Get full text
Journal Article -
10
Guest Editorial The Quantum Internet: Principles, Protocols and Architectures
Published in IEEE journal on selected areas in communications (01-07-2024)“…The Quantum Internet is envisioned as a global network, interconnecting heterogeneous quantum networks, able to transmit quantum information (qubits, qudits,…”
Get full text
Journal Article -
11
Parallelizing quantum circuits
Published in Theoretical computer science (06-06-2009)“…We present a novel automated technique for parallelizing quantum circuits via the forward and backward translation to measurement-based quantum computing…”
Get full text
Journal Article -
12
QMA-hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge
Published in 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) (01-11-2020)“…We provide several advances to the understanding of the class of Quantum Merlin-Arthur proof systems (QMA), the quantum analogue of NP. Our central…”
Get full text
Conference Proceeding -
13
Categorical composable cryptography: extended version
Published 18-10-2024“…Logical Methods in Computer Science, Volume 19, Issue 4 (October 22, 2024) lmcs:9979 We formalize the simulation paradigm of cryptography in terms of category…”
Get full text
Journal Article -
14
Quantum Pseudo-Telepathy
Published in Foundations of physics (01-11-2005)Get full text
Journal Article -
15
Device-Independent Oblivious Transfer from the Bounded-Quantum-Storage-Model and Computational Assumptions
Published 02-05-2023“…New J. Phys. 25 053019 (2023) We present a device-independent protocol for oblivious transfer (DIOT) and analyze its security under the assumption that the…”
Get full text
Journal Article -
16
Rigidity for Monogamy-of-Entanglement Games
Published 01-03-2023“…Proceedings of the 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), Leibniz International Proceedings in Informatics (LiPIcs) 251…”
Get full text
Journal Article -
17
Uncloneable Cryptographic Primitives with Interaction
Published 28-02-2023“…Much of the strength of quantum cryptography may be attributed to the no-cloning property of quantum information. We construct three new cryptographic…”
Get full text
Journal Article -
18
Categorical composable cryptography
Published 28-08-2022“…Foundations of Software Science and Computation Structures (FoSSaCS) 2022 We formalize the simulation paradigm of cryptography in terms of category theory and…”
Get full text
Journal Article -
19
Classical, quantum and nonsignalling resources in bipartite games
Published in Theoretical computer science (20-05-2013)“…We study bipartite games that arise in the context of nonlocality with the help of graph theory. Our main results are alternate proofs that deciding whether a…”
Get full text
Journal Article -
20
A Quantum Vault Scheme for Digital Currency
Published 08-08-2024“…A digital currency is money in a digital form. In this model, maintaining integrity of the supply is a core concern, therefore protections against…”
Get full text
Journal Article