Search Results - "Broadbent, Anne"

Refine Results
  1. 1

    Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions by Broadbent, Anne, Yuen, Peter

    Published in New journal of physics (01-05-2023)
    “…Abstract We present a device-independent protocol for oblivious transfer (DIOT) and analyse its security under the assumption that the receiver’s quantum…”
    Get full text
    Journal Article
  2. 2

    Demonstration of Blind Quantum Computing by Barz, Stefanie, Kashefi, Elham, Broadbent, Anne, Fitzsimons, Joseph F., Zeilinger, Anton, Walther, Philip

    “…Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental…”
    Get full text
    Journal Article
  3. 3

    Categorical composable cryptography: extended version by Broadbent, Anne, Karvonen, Martti

    Published in Logical methods in computer science (01-01-2023)
    “…We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric…”
    Get full text
    Journal Article
  4. 4

    Finite-key security analysis for multilevel quantum key distribution by Brádler, Kamil, Mirhosseini, Mohammad, Fickler, Robert, Broadbent, Anne, Boyd, Robert

    Published in New journal of physics (14-07-2016)
    “…We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an…”
    Get full text
    Journal Article
  5. 5

    Quantum Private Information Retrieval has Linear Communication Complexity by Baumeler, Ämin, Broadbent, Anne

    Published in Journal of cryptology (01-01-2015)
    “…In private information retrieval (PIR), a client queries an n -bit database in order to retrieve an entry of her choice, while maintaining privacy of her query…”
    Get full text
    Journal Article
  6. 6

    Algebra of Nonlocal Boxes and the Collapse of Communication Complexity by Botteron, Pierre, Broadbent, Anne, Chhaibi, Reda, Nechita, Ion, Pellegrini, Clément

    Published in Quantum (Vienna, Austria) (10-07-2024)
    “…Communication complexity quantifies how difficult it is for two distant computers to evaluate a function f ( X , Y ) , where the strings X and Y are…”
    Get full text
    Journal Article
  7. 7

    Towards Quantum One-Time Memories from Stateless Hardware by Broadbent, Anne, Gharibian, Sevag, Zhou, Hong-Sheng

    Published in Quantum (Vienna, Austria) (08-04-2021)
    “…A central tenet of theoretical cryptography is the study of the minimal assumptions required to implement a given cryptographic primitive. One such primitive…”
    Get full text
    Journal Article
  8. 8

    Quantum cryptography beyond quantum key distribution by Broadbent, Anne, Schaffner, Christian

    Published in Designs, codes, and cryptography (01-01-2016)
    “…Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example…”
    Get full text
    Journal Article
  9. 9

    Extending the Known Region of Nonlocal Boxes that Collapse Communication Complexity by Botteron, Pierre, Broadbent, Anne, Proulx, Marc-Olivier

    Published in Physical review letters (16-02-2024)
    “…Nonsignaling boxes (NS) are theoretical resources defined by the principle of no-faster-than-light communication. They generalize quantum correlations and some…”
    Get full text
    Journal Article
  10. 10

    Guest Editorial The Quantum Internet: Principles, Protocols and Architectures by Cacciapuoti, Angela Sara, Broadbent, Anne, Diamanti, Eleni, Romero, Jacquiline, Wehner, Stephanie

    “…The Quantum Internet is envisioned as a global network, interconnecting heterogeneous quantum networks, able to transmit quantum information (qubits, qudits,…”
    Get full text
    Journal Article
  11. 11

    Parallelizing quantum circuits by Broadbent, Anne, Kashefi, Elham

    Published in Theoretical computer science (06-06-2009)
    “…We present a novel automated technique for parallelizing quantum circuits via the forward and backward translation to measurement-based quantum computing…”
    Get full text
    Journal Article
  12. 12

    QMA-hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge by Broadbent, Anne, Grilo, Alex B.

    “…We provide several advances to the understanding of the class of Quantum Merlin-Arthur proof systems (QMA), the quantum analogue of NP. Our central…”
    Get full text
    Conference Proceeding
  13. 13

    Categorical composable cryptography: extended version by Broadbent, Anne, Karvonen, Martti

    Published 18-10-2024
    “…Logical Methods in Computer Science, Volume 19, Issue 4 (October 22, 2024) lmcs:9979 We formalize the simulation paradigm of cryptography in terms of category…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Device-Independent Oblivious Transfer from the Bounded-Quantum-Storage-Model and Computational Assumptions by Broadbent, Anne, Yuen, Peter

    Published 02-05-2023
    “…New J. Phys. 25 053019 (2023) We present a device-independent protocol for oblivious transfer (DIOT) and analyze its security under the assumption that the…”
    Get full text
    Journal Article
  16. 16

    Rigidity for Monogamy-of-Entanglement Games by Broadbent, Anne, Culf, Eric

    Published 01-03-2023
    “…Proceedings of the 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), Leibniz International Proceedings in Informatics (LiPIcs) 251…”
    Get full text
    Journal Article
  17. 17

    Uncloneable Cryptographic Primitives with Interaction by Broadbent, Anne, Culf, Eric

    Published 28-02-2023
    “…Much of the strength of quantum cryptography may be attributed to the no-cloning property of quantum information. We construct three new cryptographic…”
    Get full text
    Journal Article
  18. 18

    Categorical composable cryptography by Broadbent, Anne, Karvonen, Martti

    Published 28-08-2022
    “…Foundations of Software Science and Computation Structures (FoSSaCS) 2022 We formalize the simulation paradigm of cryptography in terms of category theory and…”
    Get full text
    Journal Article
  19. 19

    Classical, quantum and nonsignalling resources in bipartite games by Brassard, Gilles, Broadbent, Anne, Hänggi, Esther, Méthot, André Allan, Wolf, Stefan

    Published in Theoretical computer science (20-05-2013)
    “…We study bipartite games that arise in the context of nonlocality with the help of graph theory. Our main results are alternate proofs that deciding whether a…”
    Get full text
    Journal Article
  20. 20

    A Quantum Vault Scheme for Digital Currency by Broadbent, Anne, Kazmi, Raza Ali, Minwalla, Cyrus

    Published 08-08-2024
    “…A digital currency is money in a digital form. In this model, maintaining integrity of the supply is a core concern, therefore protections against…”
    Get full text
    Journal Article