Skip to main content

Showing 1–4 of 4 results for author: Stebila, D

Searching in archive quant-ph. Search in all archives.
.
  1. Quantum one-time programs

    Authors: Anne Broadbent, Gus Gutoski, Douglas Stebila

    Abstract: One-time programs are modelled after a black box that allows a single evaluation of a function, and then self-destructs. Because software can, in principle, be copied, general one-time programs exists only in the hardware token model: it has been shown that any function admits a one-time program as long as we assume access to physical devices called one-time memories. Quantum information, with its… ▽ More

    Submitted 5 November, 2012; originally announced November 2012.

    Comments: 62 pages, 5 figures

    MSC Class: 81P94; 94A60 ACM Class: E.3; F.1

    Journal ref: Advances in Cryptology -- Proc. CRYPTO 2013, LNCS vol. 8043, pp. 344-360, Springer

  2. arXiv:1206.6150  [pdf, ps, other

    quant-ph

    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

    Authors: Michele Mosca, Douglas Stebila, Berkant Ustaoglu

    Abstract: Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it allows two parties using only public authenticated communication to establish a secret session key which can be used to encrypt messages. But if the session key is compromised, the confidentiality of encrypted messages is typically compromised as well. Without quantum mechanics, key establishment ca… ▽ More

    Submitted 26 June, 2012; originally announced June 2012.

    Comments: 17 pages

    MSC Class: 81P94; 94A60 ACM Class: E.3

  3. arXiv:0911.1295  [pdf, ps, other

    quant-ph

    Quantum Coins

    Authors: Michele Mosca, Douglas Stebila

    Abstract: One of the earliest cryptographic applications of quantum information was to create quantum digital cash that could not be counterfeited. In this paper, we describe a new type of quantum money: quantum coins, where all coins of the same denomination are represented by identical quantum states. We state desirable security properties such as anonymity and unforgeability and propose two candidate q… ▽ More

    Submitted 6 November, 2009; originally announced November 2009.

    Comments: 12 pages, 4 figures

    Journal ref: Error-Correcting Codes, Finite Geometries and Cryptography. Contemporary Mathematics, volume 523, pages 35-47. American Mathematical Society, 2010

  4. The Case for Quantum Key Distribution

    Authors: Douglas Stebila, Michele Mosca, Norbert Lütkenhaus

    Abstract: Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of e… ▽ More

    Submitted 2 December, 2009; v1 submitted 17 February, 2009; originally announced February 2009.

    Comments: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009 Workshop on Quantum and Classical Information Security; version 2 minor content revisions

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, volume 36, page 283--296. Springer, 2010.