2015
DOI: 10.1007/s10623-015-0157-4
|View full text |Cite
|
Sign up to set email alerts
|

Quantum cryptography beyond quantum key distribution

Abstract: Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secure two-and multi-party computation and delegated quantum computation. Quantum cryptography also studies the limitations and challenges resulting from quantum adversaries-including the impossibility of quantum bit co… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
130
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 187 publications
(131 citation statements)
references
References 236 publications
0
130
0
1
Order By: Relevance
“…The relations in this game are defined by the matchings: given a matching, the correct answers are the ones which correctly identify the parity of the bits connected by an edge in the matching. For example, if (1,2) is an element of the matching, the measurement should output x 1 ⊕ x 2 . Formally, given a perfect matching M 1 , the set of answers is given by…”
Section: A Definitions and Previous Resultsmentioning
confidence: 99%
“…The relations in this game are defined by the matchings: given a matching, the correct answers are the ones which correctly identify the parity of the bits connected by an edge in the matching. For example, if (1,2) is an element of the matching, the measurement should output x 1 ⊕ x 2 . Formally, given a perfect matching M 1 , the set of answers is given by…”
Section: A Definitions and Previous Resultsmentioning
confidence: 99%
“…ces progrès s'étendront sur une riche gamme d'applications au-delà de la distribution de clés, permettant d'utiliser l'avantage obtenu en exploitant des ressources quantiques pour des tâches complexes et variées [9]. Des travaux de recherche partout device independent).…”
Section: Les Défis De Performance Et De Sécurité Pratiqueunclassified
“…Deriving new quantum cryptographic protocols for functionalities beyond the secure key exchange [26] is an active field of research (see a recent review for a summary [27]). In particular, our contributions are directly linked to the works on verifiable blind quantum computing (VUBQC) [4,5,10], secure two-party quantum computing [18,21] and quantum one-time program and quantum obfuscation [6,28].…”
Section: Related Workmentioning
confidence: 99%