Cryptography in the bounded quantum-storage model

@article{Damgrd2005CryptographyIT,
  title={Cryptography in the bounded quantum-storage model},
  author={Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner},
  journal={IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005.},
  year={2005},
  pages={24-27}
}
  • Ivan Damgård, Serge Fehr, +1 author Christian Schaffner
  • Published in
    IEEE Information Theory…
    2005
  • Mathematics, Physics, Computer Science
  • We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted. This is in sharp contrast to the classical bounded… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 54 CITATIONS

    Classical Cryptographic Protocols in a Quantum World

    VIEW 1 EXCERPT
    HIGHLY INFLUENCED

    Semi-Counterfactual Quantum Bit Commitment Protocol

    A link layer protocol for quantum networks

    VIEW 1 EXCERPT
    CITES BACKGROUND

    FILTER CITATIONS BY YEAR

    2005
    2020

    CITATION STATISTICS

    • 1 Highly Influenced Citations

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 142 REFERENCES

    A Tight High-Order Entropic Uncertainty Relation with Applications in the Bounded Quantum-Storage Model

    • I. B. Damg̊ard, S. Fehr, R. Renner, L. Salvail, C. Schaffner
    • In preparation,
    • 2006
    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    Cryptography from noisy quantum storage

    • David P. DiVincenzo, Christian Schaffner, Barbara M. Terhal, Stephanie Wehner
    • private communication,
    • 2007

    Cryptography from noisy quantum storage. private communication

    • P David, Christian Divincenzo, Barbara M Schaffner, Stephanie Terhal, Wehner
    • Cryptography from noisy quantum storage. private communication
    • 2007

    Oblivious-Transfer amplification. In Advances in Cryptology—EUROCRYPT ’07

    • Jürg Wullschleger
    • Lecture Notes in Computer Science. Springer,
    • 2007

    Oblivious-transfer amplification

    Quantum computation and quantum information

    • Thierry Paul
    • Computer Science, Mathematics
    • Math. Struct. Comput. Sci.
    • 2007

    Security in the boundedquantum-storage model

    • Stephanie Wehner, Jürg Wullschleger
    • private communication,
    • 2007