#### Filter Results:

#### Publication Year

1979

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Charles H. Bennett, Gilles Brassard
- Theor. Comput. Sci.
- 2014

- Gilles Brassard, Louis Salvail
- EUROCRYPT
- 1993

Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric channel) to send a key, reconciliation is the process of correcting errors between Alice's and Bob's version of the key. This is done by public discussion, which leaks some information about the secret key to an eavesdropper. We show how to construct protocols that leak a… (More)

- Gilles Brassard
- 1996

We provide a tight analysis of Grover's algorithm for quantum database searching. We give a simple closed-form formula for the probability of success after any given number of iterations of the algorithm. This allows us to determine the number of iterations necessary to achieve almost certainty of nding the answer. Furthermore, we analyse the behaviour of… (More)

An unknown quantum state ji can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, \Alice," and the receiver, \Bob," must prearrange the sharing of an EPR-correlated pair of particles. Alice makes a joint measurement on her EPR particle and the unknown quantum… (More)

- Charles H. Bennett, Ethan Bernstein, Gilles Brassard, Umesh V. Vazirani
- SIAM J. Comput.
- 1997

Recently a great deal of attention has been focused on quantum computation following a sequence of results [Bernstein and Vazirani, in Proc. suggesting that quantum computers are more powerful than classical probabilistic computers. Following Shor's result that factoring and the extraction of discrete logarithms are both solvable in quantum polynomial time,… (More)

- Gilles Brassard, André Allan Méthot, Albert Einstein, Boris Podolsky
- 2008

In loving memory of Asher Peres, we discuss a most important and influential paper written in 1935 by his thesis supervisor and men-tor Nathan Rosen, together with Albert Einstein and Boris Podolsky. In that paper, the trio known as EPR questioned the completeness of quantum mechanics. The authors argued that the then-new theory should not be considered… (More)

Consider a Boolean function χ : X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 = x∈X αx|x is a quantum superposition of the elements of X, and let a denote the probability that a good element is produced if A|0 is measured. If we repeat the… (More)

- Charles H. Bennett, Gilles Brassard, Claude Crépeau, Ueli Maurer
- IEEE Trans. Information Theory
- 1995

~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert [l] for a special scenario. The results have applications to unconditionally-secure secret-key agreement protocols , quantum cryptography and to a non-asymptotic and constructive treatment of the secrecy capacity of… (More)

- Gilles Brassard, David Chaum, Claude Crépeau
- J. Comput. Syst. Sci.
- 1988

Protocols are given for allowing a " prover " to convince a " verifier " that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the secret. The secret can be probabilistically or deterministically verifiable, and only one of the prover or the verifier need have constrained resources. This paper… (More)

- Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
- J. Cryptology
- 1990

September1991 Abstract We describe results from an apparatus and protocol designed to implement quantum key distribution, b y which t wo users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint ashes of polarized lightt 2) by subsequent public discussion of the sent and received versions of this… (More)