Device independence for two-party cryptography and position verification with memoryless devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Device-independent two-party cryptography secure against sequential attacks

The goal of two-party cryptography is to enable two parties, Alice andBob, to solve common tasks without the need formutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisystoragemodel by sendingmore signals than the adversary can store in a certain time frame.Here, we initiat...

متن کامل

Two-way Protocol for Quantum Cryptography with Imperfect Devices

The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.

متن کامل

On the Power of Two-Party Quantum Cryptography

We study quantum protocols among two distrustful parties. Under the sole assumption of correctness— guaranteeing that honest players obtain their correct outcomes—we show that every protocol implementing a nontrivial primitive necessarily leaks information to a dishonest player. This extends known impossibility results to all non-trivial primitives. We provide a framework for quantifying this l...

متن کامل

Two-party authenticated key exchange protocol using lattice-based cryptography

Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key to be used for protecting their subsequent communication. Lattice-based cryptographic primitives are believed to provide resilience against attacks from quantum computers. An efficient AKE protoco...

متن کامل

Asymmetric Cryptography for Mobile Devices

This paper is meant to give the reader a general overview about the application of asymmetric cryptography in communication, particular in mobile devices. The basics principles of a cryptosystem are addressed, as well as the idea of symmetric and asymmetric cryptography. The functional principles of RSA encryption and the DiffieHellman key exchange scheme, as well as the general idea of digital...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2018

ISSN: 2469-9926,2469-9934

DOI: 10.1103/physreva.97.062307