Quantum one time programs
Download
1 / 55

Quantum one-time programs - PowerPoint PPT Presentation


  • 91 Views
  • Uploaded on

Quantum one-time programs. Anne Broadbent Gus Gutoski Douglas Stebila. extended abstract: Cryptology ePrint Archive, Report 2013/343 full version (old): arXiv:1211.1080 [quant-ph]. August 9, 2013, QCrypt, Waterloo. What is a one-time program?. What is a one-time program?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Quantum one-time programs' - symona


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Quantum one time programs

Quantum one-time programs

Anne Broadbent

Gus Gutoski

Douglas Stebila

extended abstract: Cryptology ePrint Archive, Report 2013/343

full version (old): arXiv:1211.1080 [quant-ph]

August 9, 2013, QCrypt, Waterloo





















Quantum one time programs1
Quantum one-time programs

one-way

communication






Our primary result

quantum

Our primary result:


Our primary result in more detail

|fi

|yi

|mi

Our primary result... in more detail


Our primary result in more detail1

|fi

|yi

|mi

Our primary result... in more detail


Our primary result in more detail2

|fi

|yi

|mi

Our primary result... in more detail

B


Our primary result in more detail3

|fi

|yi

|mi

Our primary result... in more detail

B






1 use otms to build a reactive cotp

|fi

|yi

|mi

1. Use OTMs to build a reactive COTP


From otms to cotps

|fi

|yi

|mi

From OTMs to COTPs...


And from cotps to reactive cotps

|fi

|yi

|mi

...and from COTPs to reactive COTPs






Life is not that easy2
Life is not that easy

See Michael Ben-Or’s talk

from Wednesday



Schemes that admit qcad1
Schemes that admit QCAD

See Michael Ben-Or’s talk

from Wednesday



4 cotp for classical interaction1
4. COTP for classical interaction

How does the receiver

non-interactively (de-)authenticate

his input without learning

the key??

A

B

C



A qotp consists of

teleport

auth

A

|mi

|0i

teleport

de-auth

A QOTP consists of:


Security a simulator for our qotp
Security: a simulator for our QOTP

|yi

|fi

|mi

F

SIMULATOR


Simulator in pictures
Simulator in pictures

F

A

|0i

|mi

|0i






The end
The end

Thank you for your attention!

BANG!

extended abstract: Cryptology ePrint Archive, Report 2013/343

full version (old): arXiv:1211.1080 [quant-ph]


ad