Device independence for two-party cryptography and position verification with memoryless devices
نویسندگان
چکیده
منابع مشابه
Device-independent two-party cryptography secure against sequential attacks
The goal of two-party cryptography is to enable two parties, Alice andBob, to solve common tasks without the need formutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisystoragemodel by sendingmore signals than the adversary can store in a certain time frame.Here, we initiat...
متن کاملTwo-way Protocol for Quantum Cryptography with Imperfect Devices
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.
متن کاملOn the Power of Two-Party Quantum Cryptography
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness— guaranteeing that honest players obtain their correct outcomes—we show that every protocol implementing a nontrivial primitive necessarily leaks information to a dishonest player. This extends known impossibility results to all non-trivial primitives. We provide a framework for quantifying this l...
متن کاملTwo-party authenticated key exchange protocol using lattice-based cryptography
Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key to be used for protecting their subsequent communication. Lattice-based cryptographic primitives are believed to provide resilience against attacks from quantum computers. An efficient AKE protoco...
متن کاملAsymmetric Cryptography for Mobile Devices
This paper is meant to give the reader a general overview about the application of asymmetric cryptography in communication, particular in mobile devices. The basics principles of a cryptosystem are addressed, as well as the idea of symmetric and asymmetric cryptography. The functional principles of RSA encryption and the DiffieHellman key exchange scheme, as well as the general idea of digital...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2018
ISSN: 2469-9926,2469-9934
DOI: 10.1103/physreva.97.062307