Skip to main content

Questions tagged [cryptography]

For questions about cryptography as it relates directly to quantum computing. Not for general cryptographic methods.

2 votes
0 answers
29 views

In hetero (homodyne) detection, what does it mean to operate at the quantum shot limit?

I am an electrical engineering by trade, working on the analogue part (Transmitter & Receiver) of a quantum optical communication channel. By this, I mean I have not much experience on things ...
JustASneakyLittleMushroom's user avatar
2 votes
0 answers
41 views

Seeking Recommendations on Quantum Attacks

I'm exploring quantum attacks (in the Q1 model) on symmetric structures, including hash functions, block ciphers, modes of operation and stream ciphers with time complexity beyond quadratic speedup. I'...
ali khosravi's user avatar
1 vote
0 answers
14 views

On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver

I'm reading this paper: On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver. Here's the link: https://eprint.iacr.org/2024/565.pdf#page=29&zoom=100,...
Huy By's user avatar
  • 103
3 votes
1 answer
55 views

Benefits of using quantum encrypted keys

Considering, in a perfect world everyone has the capability to create a quantum key. What would the benefits of using quantum encrypted keys instead of using classically encrypted keys? Besides the ...
Snarz's user avatar
  • 31
2 votes
1 answer
147 views

Generating Equal Amplitude Superposition States from Another Equal Amplitude Superposition State

Can we prepare a state regarding a transformation in quantum computing that seems to generate another equal amplitude superposition state when applying a Hadamard gate? Specifically, I observed that ...
Aman's user avatar
  • 463
2 votes
0 answers
51 views

Doubt in Shor-Preskill's proof of security proof of BB84

I was going through the proof of security of the modified Lo-Chau protocol, which eventually leads to the proof of security of BB84. In the error correction step, Nielson-Chuang mention that any ...
Schroedinger'sStupid's user avatar
8 votes
1 answer
503 views

Happy 30th Anniversary to Shor's Algorithm! How challenging was the review process when it was first announced?

Shor's algorithm dropped 30 years ago sometime in April, 1994. Peter Shor has given many wonderful accounts of the early history of the field and of what sparked his particular interest. Shor has been ...
Mark Spinelli's user avatar
3 votes
0 answers
64 views

Mutual information between Alice and Eve in a BB84 intercept resend attack

I'm new to information theory and i need to calculate $I(A,E)$. To calculate it I need conditional entropy $H(A|E)$. I assume the BB84 protocol standard states $\{ |0\rangle,|1\rangle \},\{|+\rangle,|-...
forgetfuled's user avatar
4 votes
0 answers
181 views

Can Alice and Bob convince the cops that they don't share any entanglement?

Suppose Alice and Bob are arrested for killing Eve, and are taken to two different interrogation rooms. The police quiz Alice and separately Bob, asking them a bunch of different questions along the ...
Mark Spinelli's user avatar
2 votes
1 answer
98 views

Security of BB84 QKD protocol

I am studying the BB84 protocol and I have some doubts regarding its security. Consider the following example: Alice wants to send a message to Bob over a public quantum channel, where a third person (...
aghin's user avatar
  • 129
2 votes
1 answer
97 views

Does assuming the security of LWE imply $BPP\subset BQP$?

Here's a "proof" for why $BPP\subset BQP$ assuming Learning With Errors (LWE) is postquantum. Consider the Mahadev protocol that uses LWE-based cryptography to verify if an instance $x\in L$ ...
user1936752's user avatar
  • 3,085
2 votes
1 answer
67 views

How is controlled constant addition implemented for binary polynomials?

So, currently I am going through the paper Concrete Quantum Cryptanalysis of Binary Elliptic Curves. The section on point addition mentions that for adding two points $P_1$ and $P_2$, they assume that ...
Ash Ketchum's user avatar
2 votes
1 answer
67 views

Quantum Encryption Schemes

With the introduction of quantum computing and realizing it capabilities through Shor's algorithm and other advancements, cryptographers shifted their focus on post-quantum cryptography, where they ...
Josh's user avatar
  • 417
3 votes
1 answer
186 views

Quantum homomorphic encryption with a classical verifier - clarifying the setting?

The quantum homomorphic protocol I am discussing is in Urmila Mahadev (2018). The summary is that it allows a fully classical verifier to interact with a quantum prover to run a quantum circuit. It is ...
user1936752's user avatar
  • 3,085
2 votes
0 answers
32 views

Role of eavesdroppers in B92 of phase modulation

I have a question about the phase modulation scheme described in Bennett et al. (1992). In figure 2 of this paper, it says Source at left supplies the coherent pulse of M>1 expected photons ...
tare_'s user avatar
  • 81

15 30 50 per page
1
2 3 4 5
10