2019
DOI: 10.1088/1367-2630/ab0e3b
|View full text |Cite
|
Sign up to set email alerts
|

Composable security in relativistic quantum cryptography

Abstract: Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of light to constraint the abilities of dishonest agents. However, composing such protocols with each other to construct new cryptographic resources is known to be insecure in some cases. To make general statements about such constructions, a composable framework for m… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(38 citation statements)
references
References 37 publications
(184 reference statements)
0
38
0
Order By: Relevance
“…The precise relationships between all these notions of causality, their operational meaning and implications for the physics of information processing remains open. In an upcoming work involving one the authors [53], further relationships between the interventionist notion of causation, indefinite causation and no superluminal signalling are derived by extending the approach initiated here. This suggests that indefinite causation can be explained through definite cyclic causation (as also implied by the results of [28]), which would mean that cyclic and non-classical causal models can have applications beyond scenarios with a definite spacetime structure.…”
Section: Open Questionsmentioning
confidence: 93%
See 2 more Smart Citations
“…The precise relationships between all these notions of causality, their operational meaning and implications for the physics of information processing remains open. In an upcoming work involving one the authors [53], further relationships between the interventionist notion of causation, indefinite causation and no superluminal signalling are derived by extending the approach initiated here. This suggests that indefinite causation can be explained through definite cyclic causation (as also implied by the results of [28]), which would mean that cyclic and non-classical causal models can have applications beyond scenarios with a definite spacetime structure.…”
Section: Open Questionsmentioning
confidence: 93%
“…f. Indefinite space-time locations: In the present work, we have embedded causal models in a space-time structure by assigning a single space-time location to each observed system. More generally, we can have, both in theory and practice, systems whose space-time locations are associated with some classical or quantum uncertainty or protocols involving quantum systems that are delocalised over space and in time [27,53,[69][70][71]. It would therefore be of interest to generalise our methods to allow for such superpositions.…”
Section: E Causal Discovery In the Presence Of Fine-tuningmentioning
confidence: 99%
See 1 more Smart Citation
“…The argument of Ref. [48] is that a condition for a coin-flipping protocol to have composable security is that the outcome o of the protocol must be independent of the outcome o of another arbitrary coin-flipping protocol that may take place in parallel, and that this condition cannot be guaranteed because a dishonest party may apply a man-in-the-middle attack and correlate the outcomes o and o of both protocols. We discuss below how this argument applies to our die-rolling protocols.…”
Section: Unconditionally Secure Relativistic Multi-party Biased Die Rollingmentioning
confidence: 99%
“…It follows from Ref. [48] and from the previous discussion that our die-rolling protocols cannot be composed securely in arbitrary ways. However, an honest party can participate in various die-rolling protocols in parallel and be guaranteed not only that each protocol is secure on its own but also that the outcomes of the protocols are independent, by choosing carefully the space–time regions where she communicates her messages to, and where she accepts messages from, the other parties in all the protocols where she is participating.…”
Section: Unconditionally Secure Relativistic Multi-party Biased Die Rollingmentioning
confidence: 99%