Results 1  10
of
11
Oracle quantum computing
 Brassard & U.Vazirani, Strengths and weaknesses of quantum computing
, 1994
"... \Because nature isn't classical, dammit..." ..."
Abstract

Cited by 114 (9 self)
 Add to MetaCart
\Because nature isn't classical, dammit..."
Quantum Oblivious Mutual Identification
"... . We consider a situation where two parties, Alice and Bob, share a common secret string and would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a w ..."
Abstract

Cited by 16 (5 self)
 Add to MetaCart
. We consider a situation where two parties, Alice and Bob, share a common secret string and would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a way that honest parties will always succeed in convincing each other, while a dishonest party interacting with an honest party will have vanishingly small probability of convincing him. Moreover, a dishonest party gains only a very small amount of information about the secret string from running the protocol: whoever enters the protocol with no knowledge of the secret string would have to enter this protocol an exponential number of times in order to gain nonnegligible information about the string. Our scheme offers an efficient identification technique with a security that depends on no computational assumption, only on the correctness of quantum mechanics. We believe such a system should b...
A Quick Glance at Quantum Cryptography
, 1998
"... The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it oc ..."
Abstract

Cited by 8 (2 self)
 Add to MetaCart
The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping should it not occur. Contents 1 Cryptographic systems before quantum cryptography 3 2 Preamble to quantum cryptography 7 Partially supported by ARL Contract #DAAL0195P1884, ARO Grant #P38804PH QC, and the LOOP Fund. 3 The BB84 quantum cryptographic protocol without noise 10 3.1 Stage 1. Communication over a quantum channel . . . . . . . 12 3.2 Stage 2. Communication in two phases over a public channel . 14 3.2.1 Phase 1 of Stage 2. Extraction of raw key . . . . . . . 14 3.2.2 Phase 2 of Stage 2. Detection of Eve's intrusion via error detection . . . . . . . . . . . . . . . . . . . . . . 15 4 The BB84 quantum cryptographic pr...
Alternative Computational Models: A Comparison of Biomolecular and Quantum Computation
 INVITED PAPER,18TH INTERNATIONAL CONFERENCE ON FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCEINCE (FST&TCS98
, 1998
"... ..."
(Show Context)
Cryptology Column  25 Years of Quantum Cryptography
, 1996
"... The fates of SIGACT News and Quantum Cryptography are inseparably entangled. The exact date of Stephen Wiesner's invention of "conjugate coding" is unknown but it cannot be far from April 1969, when the premier issue of SIGACT Newsor rather SICACT News as it was known at the time ..."
Abstract

Cited by 6 (4 self)
 Add to MetaCart
The fates of SIGACT News and Quantum Cryptography are inseparably entangled. The exact date of Stephen Wiesner's invention of "conjugate coding" is unknown but it cannot be far from April 1969, when the premier issue of SIGACT Newsor rather SICACT News as it was known at the timecame out. Much later, it was in SIGACT News that Wiesner's paper finally appeared [74] in the wake of the first author's early collaboration with Charles H. Bennett [7]. It was also in SIGACT News that the original experimental demonstration for quantum key distribution was announced for the first time [6] and that a thorough bibliography was published [19]. Finally, it was in SIGACT News that Doug Wiedemann chose to publish his discovery when he reinvented quantum key distribution in 1987, unaware of all previous work but Wiesner's [73, 5]. Most of the first decade of the history of quant
Quantum Information Processing: Algorithms, Technologies and Challenges
 BIOINSPIRED COMPUTING, (EDITED BY M. M. ESHAGHIANWILNER
, 2009
"... Quantum Computation (QC) is a type of computation where unitary and measurement operations are executed on linear superpositions of basis states. This paper provides a brief introduction to QC. We begin with a discussion of basic models for QC such as quantum TMs, quantum gates and circuits and rela ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
(Show Context)
Quantum Computation (QC) is a type of computation where unitary and measurement operations are executed on linear superpositions of basis states. This paper provides a brief introduction to QC. We begin with a discussion of basic models for QC such as quantum TMs, quantum gates and circuits and related complexity results. We then discuss a number of topics in quantum information theory, including bounds for quantum communication and I/O complexity, methods for quantum data compression. and quantum error correction (that is, techniques for decreasing decoherence errors in QC), Furthermore, we enumerate a number of methodologies and technologies for doing QC. Finally, we discuss resource bounds for QC including bonds for processing time, energy and volume, particularly emphasizing challenges in determining volume bounds for observation apperatus.
Quantum Oblivious Mutual Identification
"... Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a way that honest parties will always succeed i ..."
Abstract
 Add to MetaCart
Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a way that honest parties will always succeed in convincing each other, while a dishonest party interacting with an honest party will have vanishingly small probability of convincing him. Moieover, a dishonest party gains only d very small amount, of information about t,he secret string from running the protocol: whoever enters the protocol with no knowledge of the secret string would have to enter this protocol an exponential number of times in order to gain nonnegligible information about the string. Our scheme offers an efficient identification technique with a security that depends on no computational assumption, only on the correctness of quantum mechanics. We believe such a system should be used in smart
Quantum Computing
"... Quantum Computation (QC) is a type of computation where unitary and measurement operations are executed on linear superpositions of basis states. This paper provides a brief introduction to QC. We begin with a discussion of basic models for QC such as quantum TMs, quantum gates and circuits and rela ..."
Abstract
 Add to MetaCart
Quantum Computation (QC) is a type of computation where unitary and measurement operations are executed on linear superpositions of basis states. This paper provides a brief introduction to QC. We begin with a discussion of basic models for QC such as quantum TMs, quantum gates and circuits and related complexity results. We then discuss a number of topics in quantum information theory, including bounds for quantum communication and I/O complexity, methods for quantum data compression. and quantum er
IT Security Trends
"... Abstract This paper examines recent trends in the area of information security. It presents attacks and vulnerabilities of IT systems and networks, addresses the IT security market, and discusses the IT security hype cycle. Concerning technology trends, the paper focuses on two specific fields: cryp ..."
Abstract
 Add to MetaCart
(Show Context)
Abstract This paper examines recent trends in the area of information security. It presents attacks and vulnerabilities of IT systems and networks, addresses the IT security market, and discusses the IT security hype cycle. Concerning technology trends, the paper focuses on two specific fields: cryptography, which is the basis for a large variety of security services, and user authentication, including biometric and token authentication. 1