Secret-key reconciliation by public discussion
G Brassard, L Salvail - Workshop on the Theory and Application of of …, 1993 - Springer
Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric
channel) to send a key, reconciliation is the process of correcting errors between Alice’s and …
channel) to send a key, reconciliation is the process of correcting errors between Alice’s and …
Experimental quantum cryptography
CH Bennett, F Bessette, G Brassard, L Salvail… - Journal of …, 1992 - Springer
We describe results from an apparatus and protocol designed to implement quantum key
distribution, by which two users, who share no secret information initially: (1) exchange a …
distribution, by which two users, who share no secret information initially: (1) exchange a …
The SECOQC quantum key distribution network in Vienna
…, E Querasser, G Ribordy, S Robyr, L Salvail… - New journal of …, 2009 - iopscience.iop.org
In this paper, we present the quantum key distribution (QKD) network designed and implemented
by the European project SEcure COmmunication based on Quantum Cryptography (…
by the European project SEcure COmmunication based on Quantum Cryptography (…
Cryptography in the bounded-quantum-storage model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming
that the adversary's quantum memory is of bounded size. We show that oblivious transfer …
that the adversary's quantum memory is of bounded size. We show that oblivious transfer …
[HTML][HTML] Using quantum key distribution for cryptographic purposes: A survey
…, R Renner, G Ribordy, M Riguidel, L Salvail… - Theoretical Computer …, 2014 - Elsevier
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is
the ability to prove the information-theoretic security (ITS) of the established keys. As a key …
the ability to prove the information-theoretic security (ITS) of the established keys. As a key …
Blind quantum computation
P Arrighi, L Salvail - International Journal of Quantum Information, 2006 - World Scientific
We investigate the possibility of having someone carry out the work of executing a function
for you, but without letting him learn anything about your input. Say Alice wants Bob to …
for you, but without letting him learn anything about your input. Say Alice wants Bob to …
Security of trusted repeater quantum key distribution networks
L Salvail, M Peev, E Diamanti… - Journal of …, 2010 - journals.sagepub.com
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance
and high-rate secret key agreement with information-theoretic security. In this paper …
and high-rate secret key agreement with information-theoretic security. In this paper …
Solving the maximum clique problem using a tabu search approach
M Gendreau, P Soriano, L Salvail - Annals of operations research, 1993 - Springer
We describe two variants of a tabu search heuristic, a deterministic one and a probabilistic
one, for the maximum clique problem. This heuristic may be viewed as a natural alternative …
one, for the maximum clique problem. This heuristic may be viewed as a natural alternative …
On the (im) possibility of basing oblivious transfer and bit commitment on weakened security assumptions
I Damgård, J Kilian, L Salvail - International Conference on the Theory and …, 1999 - Springer
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with
information theoretic security, on seemingly weaker primitives. We introduce a general model …
information theoretic security, on seemingly weaker primitives. We introduce a general model …
A tight high-order entropic quantum uncertainty relation with applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is
tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1…
tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1…