Skip to main content

Showing 1–5 of 5 results for author: Gagliardoni, T

Searching in archive quant-ph. Search in all archives.
.
  1. Can you sign a quantum state?

    Authors: Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz

    Abstract: Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed signific… ▽ More

    Submitted 6 December, 2021; v1 submitted 28 November, 2018; originally announced November 2018.

    Comments: 26+12 pages, v4: version for publication in Quantum, v5: CC license

    Journal ref: Quantum 5, 603 (2021)

  2. Unforgeable Quantum Encryption

    Authors: Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz

    Abstract: We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating in such scenarios. Quantumly, this approach would violate no-cloning. We develop new techniques to overcome this problem: we use entanglement to… ▽ More

    Submitted 13 October, 2018; v1 submitted 19 September, 2017; originally announced September 2017.

    Comments: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed, some proofs related to QIND-CCA2 clarified

    Journal ref: Advances in Cryptology - EUROCRYPT 2018. Lecture Notes in Computer Science, vol 10822. Springer, Cham

  3. arXiv:1705.02417  [pdf, other

    cs.CR cs.CC quant-ph

    Quantum Security of Cryptographic Primitives

    Authors: Tommaso Gagliardoni

    Abstract: We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such… ▽ More

    Submitted 5 May, 2017; originally announced May 2017.

    Comments: PhD Thesis. This document is an electronic version with minor modifications of the original, published through the E-Publishing-Service of the TU Darmstadt

  4. Computational Security of Quantum Encryption

    Authors: Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules

    Abstract: Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks. In this work, we initiate the study of another relevant topic: the encryption of quantum data in the computational setting. In this directi… ▽ More

    Submitted 3 February, 2016; originally announced February 2016.

    Comments: 31 pages, 3 figures

    Journal ref: Proceedings of the International Conference on Information Theoretic Security (ICITS 2016) pp. 47-71

  5. Semantic Security and Indistinguishability in the Quantum World

    Authors: Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner

    Abstract: At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed first indistinguishability definitions for the quantum world where the actual indistinguishability only holds for classical messages, and they provide arguments why it might be hard to achieve a stronger notion. In this work, we show that stronger notions are achievable, where the indistinguishability… ▽ More

    Submitted 1 June, 2016; v1 submitted 20 April, 2015; originally announced April 2015.

    Comments: 37 pages, 2 figures