Questions tagged [cryptography]
For questions about cryptography as it relates directly to quantum computing. Not for general cryptographic methods.
140
questions
2
votes
0
answers
29
views
In hetero (homodyne) detection, what does it mean to operate at the quantum shot limit?
I am an electrical engineering by trade, working on the analogue part (Transmitter & Receiver) of a quantum optical communication channel. By this, I mean I have not much experience on things ...
2
votes
0
answers
41
views
Seeking Recommendations on Quantum Attacks
I'm exploring quantum attacks (in the Q1 model) on symmetric structures, including hash functions, block ciphers, modes of operation and stream ciphers with time complexity beyond quadratic speedup. I'...
1
vote
0
answers
14
views
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver
I'm reading this paper: On the construction of quantum circuits for
S-boxes with different criteria based on the SAT
solver. Here's the link: https://eprint.iacr.org/2024/565.pdf#page=29&zoom=100,...
3
votes
1
answer
55
views
Benefits of using quantum encrypted keys
Considering, in a perfect world everyone has the capability to create a quantum key. What would the benefits of using quantum encrypted keys instead of using classically encrypted keys? Besides the ...
2
votes
1
answer
147
views
Generating Equal Amplitude Superposition States from Another Equal Amplitude Superposition State
Can we prepare a state regarding a transformation in quantum computing that seems to generate another equal amplitude superposition state when applying a Hadamard gate?
Specifically, I observed that ...
2
votes
0
answers
51
views
Doubt in Shor-Preskill's proof of security proof of BB84
I was going through the proof of security of the modified Lo-Chau protocol, which eventually leads to the proof of security of BB84. In the error correction step, Nielson-Chuang mention that any ...
8
votes
1
answer
503
views
Happy 30th Anniversary to Shor's Algorithm! How challenging was the review process when it was first announced?
Shor's algorithm dropped 30 years ago sometime in April, 1994. Peter Shor has given many wonderful accounts of the early history of the field and of what sparked his particular interest.
Shor has been ...
3
votes
0
answers
64
views
Mutual information between Alice and Eve in a BB84 intercept resend attack
I'm new to information theory and i need to calculate $I(A,E)$.
To calculate it I need conditional entropy $H(A|E)$.
I assume the BB84 protocol standard states $\{ |0\rangle,|1\rangle \},\{|+\rangle,|-...
4
votes
0
answers
181
views
Can Alice and Bob convince the cops that they don't share any entanglement?
Suppose Alice and Bob are arrested for killing Eve, and are taken to two different interrogation rooms. The police quiz Alice and separately Bob, asking them a bunch of different questions along the ...
2
votes
1
answer
98
views
Security of BB84 QKD protocol
I am studying the BB84 protocol and I have some doubts regarding its security.
Consider the following example: Alice wants to send a message to Bob over a public quantum channel, where a third person (...
2
votes
1
answer
97
views
Does assuming the security of LWE imply $BPP\subset BQP$?
Here's a "proof" for why $BPP\subset BQP$ assuming Learning With Errors (LWE) is postquantum.
Consider the Mahadev protocol that uses LWE-based cryptography to verify if an instance $x\in L$ ...
2
votes
1
answer
67
views
How is controlled constant addition implemented for binary polynomials?
So, currently I am going through the paper Concrete Quantum Cryptanalysis of Binary Elliptic Curves. The section on point addition mentions that for adding two points $P_1$ and $P_2$, they assume that ...
2
votes
1
answer
67
views
Quantum Encryption Schemes
With the introduction of quantum computing and realizing it capabilities through Shor's algorithm and other advancements, cryptographers shifted their focus on post-quantum cryptography, where they ...
3
votes
1
answer
186
views
Quantum homomorphic encryption with a classical verifier - clarifying the setting?
The quantum homomorphic protocol I am discussing is in Urmila Mahadev (2018). The summary is that it allows a fully classical verifier to interact with a quantum prover to run a quantum circuit.
It is ...
2
votes
0
answers
32
views
Role of eavesdroppers in B92 of phase modulation
I have a question about the phase modulation scheme described in Bennett et al. (1992). In figure 2 of this paper, it says
Source at left supplies the coherent pulse of M>1 expected photons ...