2,810 research outputs found
Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP
When elementary quantum systems, such as polarized photons, are used to
transmit digital information, the uncertainty principle gives rise to novel
cryptographic phenomena unachievable with traditional transmission media, e.g.
a communications channel on which it is impossible in principle to eavesdrop
without a high probability of being detected. With such a channel, a one-time
pad can safely be reused many times as long as no eavesdrop is detected, and,
planning ahead, part of the capacity of these uncompromised transmissions can
be used to send fresh random bits with which to replace the one-time pad when
an eavesdrop finally is detected. Unlike other schemes for stretching a
one-time pad, this scheme does not depend on complexity-theoretic assumptions
such as the difficulty of factoring.Comment: Original 1982 submission to ACM Symposium on Theory of Computing with
spelling and typographical corrections, and comments by the authors 32 years
later. Submitted to Natural Computin
Recommended from our members
Texas Business Review, January 1977
How Oil Supports Prosperity in Texas; El Paso Economic Profile; Construction Activity and the Tax Reform Act of 1976Bureau of Business Researc
Recommended from our members
Texas Business Review, July 1977
College Enrollment Shifts Anticipate Current Job Market; San Antonio: A Military, Trade and Service Center; The High Price of HousingBureau of Business Researc
Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
We revisit the notion of deniability in quantum key exchange (QKE), a topic
that remains largely unexplored. In the only work on this subject by Donald
Beaver, it is argued that QKE is not necessarily deniable due to an
eavesdropping attack that limits key equivocation. We provide more insight into
the nature of this attack and how it extends to other constructions such as QKE
obtained from uncloneable encryption. We then adopt the framework for quantum
authenticated key exchange, developed by Mosca et al., and extend it to
introduce the notion of coercer-deniable QKE, formalized in terms of the
indistinguishability of real and fake coercer views. Next, we apply results
from a recent work by Arrazola and Scarani on covert quantum communication to
establish a connection between covert QKE and deniability. We propose DC-QKE, a
simple deniable covert QKE protocol, and prove its deniability via a reduction
to the security of covert QKE. Finally, we consider how entanglement
distillation can be used to enable information-theoretically deniable protocols
for QKE and tasks beyond key exchange.Comment: 16 pages, published in the proceedings of NordSec 201
Can closed timelike curves or nonlinear quantum mechanics improve quantum state discrimination or help solve hard problems?
We study the power of closed timelike curves (CTCs) and other nonlinear
extensions of quantum mechanics for distinguishing nonorthogonal states and
speeding up hard computations. If a CTC-assisted computer is presented with a
labeled mixture of states to be distinguished--the most natural formulation--we
show that the CTC is of no use. The apparent contradiction with recent claims
that CTC-assisted computers can perfectly distinguish nonorthogonal states is
resolved by noting that CTC-assisted evolution is nonlinear, so the output of
such a computer on a mixture of inputs is not a convex combination of its
output on the mixture's pure components. Similarly, it is not clear that CTC
assistance or nonlinear evolution help solve hard problems if computation is
defined as we recommend, as correctly evaluating a function on a labeled
mixture of orthogonal inputs.Comment: 4 pages, 3 figures. Final version. Added several references, updated
discussion and introduction. Figure 1(b) very much enhance
- …