#### Filter Results:

- Full text PDF available (110)

#### Publication Year

1979

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Charles H. Bennett, Gilles Brassard
- Theor. Comput. Sci.
- 2014

- R Feynman, Quan, +23 authors U Vazi-Rani
- 1994

Are there interactive protocols for co-NP languages? " Inform. book contains reprints of the articles that were critical in the development of the fastest known factoring algorithm. A rigorous time bound for factoring integers, " J. Amer. Math. Soc. An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance, " IEEE… (More)

- Gilles Brassard, Louis Salvail
- EUROCRYPT
- 1993

Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric channel) to send a key, reconciliation is the process of correcting errors between Alice's and Bob's version of the key. This is done by public discussion, which leaks some information about the secret key to an eavesdropper. We show how to construct protocols that leak a… (More)

An unknown quantum state ji can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, \Alice," and the receiver, \Bob," must prearrange the sharing of an EPR-correlated pair of particles. Alice makes a joint measurement on her EPR particle and the unknown quantum… (More)

In loving memory of Asher Peres, we discuss a most important and influential paper written in 1935 by his thesis supervisor and men-tor Nathan Rosen, together with Albert Einstein and Boris Podolsky. In that paper, the trio known as EPR questioned the completeness of quantum mechanics. The authors argued that the then-new theory should not be considered… (More)

- Charles H. Bennett, Ethan Bernstein, Gilles Brassard, Umesh V. Vazirani
- SIAM J. Comput.
- 1997

Recently a great deal of attention has been focused on quantum computation following a sequence of results [Bernstein and Vazirani, in Proc. suggesting that quantum computers are more powerful than classical probabilistic computers. Following Shor's result that factoring and the extraction of discrete logarithms are both solvable in quantum polynomial time,… (More)

Consider a Boolean function χ : X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 = x∈X αx|x is a quantum superposition of the elements of X, and let a denote the probability that a good element is produced if A|0 is measured. If we repeat the… (More)

- Charles H. Bennett, Gilles Brassard, Claude Crépeau, Ueli Maurer
- IEEE Trans. Information Theory
- 1995

~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert [l] for a special scenario. The results have applications to unconditionally-secure secret-key agreement protocols , quantum cryptography and to a non-asymptotic and constructive treatment of the secrecy capacity of… (More)

- Gilles Brassard, David Chaum, Claude Crépeau
- J. Comput. Syst. Sci.
- 1988

Protocols are given for allowing a " prover " to convince a " verifier " that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the secret. The secret can be probabilistically or deterministically verifiable, and only one of the prover or the verifier need have constrained resources. This paper… (More)

- Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
- J. Cryptology
- 1990

We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint ashes of polarized light; 2) by subsequent public discussion of the sent and received versions of this transmission estimate the… (More)