829 research outputs found
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum
properties of matter. Its aim is to develop primitives beyond the reach of
classical cryptography or to improve on existing classical implementations.
Although much of the work in this field is dedicated to quantum key
distribution (QKD), some important steps were made towards the study and
development of quantum oblivious transfer (QOT). It is possible to draw a
comparison between the application structure of both QKD and QOT primitives.
Just as QKD protocols allow quantum-safe communication, QOT protocols allow
quantum-safe computation. However, the conditions under which QOT is actually
quantum-safe have been subject to a great amount of scrutiny and study. In this
review article, we survey the work developed around the concept of oblivious
transfer in the area of theoretical quantum cryptography, with an emphasis on
some proposed protocols and their security requirements. We review the
impossibility results that daunt this primitive and discuss several quantum
security models under which it is possible to prove QOT security.Comment: 40 pages, 14 figure
Quantum Cryptography: Key Distribution and Beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Quanta 2017; 6: 1–47
Eleventh International Conference on Atomic and Molecular Data and Their Applications
The 11th International Conference on Atomic and Molecular Data and their Applications (ICAMDATA) was held on November 11–15, 2018, in Cambridge, Massachusetts, and was organized by the Center for Astrophysics | Harvard & Smithsonian. This meeting is a continuation of a series which began in 1997 that was chartered to promote the use of atomic and molecular (AM) data in various fields of science and technology, to provide a forum for the interaction of AM data producers and users, and to foster crossdisciplinary cooperation between AM data producers and users as the coordination of AM data activities and databases worldwide
- …