Skip to main content

Showing 1–7 of 7 results for author: Dulek, Y

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2211.09686  [pdf, ps, other

    quant-ph cs.CR

    An efficient combination of quantum error correction and authentication

    Authors: Yfke Dulek, Garazi Muguruza, Florian Speelman

    Abstract: When sending quantum information over a channel, we want to ensure that the message remains intact. Quantum error correction and quantum authentication both aim to protect (quantum) information, but approach this task from two very different directions: error-correcting codes protect against probabilistic channel noise and are meant to be very robust against small errors, while authentication code… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 30 pages, 10 figures

  2. Device-independent quantum key distribution from computational assumptions

    Authors: Tony Metger, Yfke Dulek, Andrea Coladangelo, Rotem Arnon-Friedman

    Abstract: In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of two components, distributed to Alice and Bob, who use the device to generate a secure key. The security of existing DIQKD schemes holds under the assumption that the two components of the device cannot communicate with one another during the protocol execution. This is called the no-communication a… ▽ More

    Submitted 29 July, 2022; v1 submitted 8 October, 2020; originally announced October 2020.

    Comments: 14 pages, 2 figures; v2 is close to journal version; v3 updates only funding information, not content

    Journal ref: New Journal of Physics 23 123021 (2021)

  3. arXiv:2005.06432  [pdf, ps, other

    quant-ph cs.CR

    Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits

    Authors: Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner

    Abstract: Virtual black-box obfuscation is a strong cryptographic primitive: it encrypts a circuit while maintaining its full input/output functionality. A remarkable result by Barak et al. (Crypto 2001) shows that a general obfuscator that obfuscates classical circuits into classical circuits cannot exist. A promising direction that circumvents this impossibility result is to obfuscate classical circuits i… ▽ More

    Submitted 20 November, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

    Comments: v2: Add the notion of decomposable public keys, which allows our impossibility to hold without assuming circular security for QFHE. We also fix an auxiliary lemma (2.9 in v2) where a square root was missing (this does not influence the main result)

  4. Secure Multi-party Quantum Computation with a Dishonest Majority

    Authors: Yfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner

    Abstract: The cryptographic task of secure multi-party (classical) computation has received a lot of attention in the last decades. Even in the extreme case where a computation is performed between $k$ mutually distrustful players, and security is required even for the single honest player if all other players are colluding adversaries, secure protocols are known. For quantum computation, on the other hand,… ▽ More

    Submitted 4 May, 2020; v1 submitted 30 September, 2019; originally announced September 2019.

    Comments: v2: added summarizing section about complexity, a few figures, and various minor improvements. Main text: 29 pages, appendices: 22 pages

    Journal ref: Advances in Cryptology - EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12107. Springer, Cham

  5. arXiv:1804.02237  [pdf, other

    quant-ph cs.CR

    Quantum ciphertext authentication and key recycling with the trap code

    Authors: Yfke Dulek, Florian Speelman

    Abstract: We investigate quantum authentication schemes constructed from quantum error-correcting codes. We show that if the code has a property called purity testing, then the resulting authentication scheme guarantees the integrity of ciphertexts, not just plaintexts. On top of that, if the code is strong purity testing, the authentication scheme also allows the encryption key to be recycled, partially ev… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  6. Quantum Fully Homomorphic Encryption With Verification

    Authors: Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman

    Abstract: Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation. Given the numerous applications of classical FHE (zero-knowledge proofs, secure two-party computation, obfuscation, etc.) it is reasonable to hope that quantum FHE (or QFHE) will lead to many new results in the quantum s… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 30 pages

  7. Quantum homomorphic encryption for polynomial-sized circuits

    Authors: Yfke Dulek, Christian Schaffner, Florian Speelman

    Abstract: We present a new scheme for quantum homomorphic encryption which is compact and allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the framework of Broadbent and Jeffery and recent results in the area of instantaneous non-local quantum computation, we show how to construct quantum gadgets that allow perfect correction of the errors which occur during the ho… ▽ More

    Submitted 24 June, 2016; v1 submitted 31 March, 2016; originally announced March 2016.