Erika Andersson
YOU?
Author Swipe
View article: Quantum Protocols for Rabin Oblivious Transfer
Quantum Protocols for Rabin Oblivious Transfer Open
Rabin oblivious transfer is the cryptographic task where Alice wishes to receive a bit from Bob but it may get lost with probability 1/2. In this work, we provide protocol designs which yield quantum protocols with improved security. Moreo…
View article: Quantum Rabin oblivious transfer using two pure states
Quantum Rabin oblivious transfer using two pure states Open
Oblivious transfer between two untrusting parties is an important primitive in cryptography. There are different variants of oblivious transfer. In Rabin oblivious transfer, the sender Alice holds a bit, and the receiver Bob either obtains…
View article: Incomplete quantum oblivious transfer with perfect one-sided security
Incomplete quantum oblivious transfer with perfect one-sided security Open
Oblivious transfer is a fundamental cryptographic primitive which is useful for secure multiparty computation. There are several variants of oblivious transfer. We consider 1 out of 2 oblivious transfer, where a sender sends two bits of in…
View article: Cheating in quantum Rabin oblivious transfer using delayed measurements
Cheating in quantum Rabin oblivious transfer using delayed measurements Open
Oblivious transfer has been the interest of study as it can be used as a building block for multiparty computation. There are many forms of oblivious transfer; we explore a variant known as Rabin oblivious transfer. Here the sender Alice h…
View article: Quantum Rabin oblivious transfer using two pure states
Quantum Rabin oblivious transfer using two pure states Open
Oblivious transfer between two untrusting parties is an important primitive in cryptography. There are different variants of oblivious transfer. In Rabin oblivious transfer, the sender Alice holds a bit, and the receiver Bob either obtains…
View article: Error-tolerant oblivious transfer in the noisy-storage model
Error-tolerant oblivious transfer in the noisy-storage model Open
The noisy-storage model of quantum cryptography allows for information-theoretically secure two-party computation based on the assumption that a cheating user has at most access to an imperfect, noisy quantum memory, whereas the honest use…
View article: Experimental demonstration of optimal unambiguous two-out-of-four quantum state elimination
Experimental demonstration of optimal unambiguous two-out-of-four quantum state elimination Open
A core principle of quantum theory is that nonorthogonal quantum states cannot be perfectly distinguished with single-shot measurements. However, it is possible to exclude a subset of nonorthogonal states without error in certain circumsta…
View article: Noninteractive xor Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations
Noninteractive xor Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations Open
Oblivious transfer (OT) is an important cryptographic primitive. Any multiparty computation can be realized with OT as building block. xor oblivious transfer (XOT) is a variant where the sender Alice has two bits and a receiver Bob obtains…
View article: Quantum cryptography beyond quantum key distribution: variants of quantum oblivious transfer
Quantum cryptography beyond quantum key distribution: variants of quantum oblivious transfer Open
Modern cryptography is more than sending secret messages, and quantum cryptography is more than quantum key distribution. One example is oblivious transfer, which is interesting partly because it can be used to implement secure multiparty …
View article: Error-tolerant oblivious transfer in the noisy-storage model
Error-tolerant oblivious transfer in the noisy-storage model Open
The noisy-storage model of quantum cryptography allows for information-theoretically secure two-party computation based on the assumption that a cheating user has at most access to an imperfect, noisy quantum memory, whereas the honest use…
View article: Non-interactive XOR quantum oblivious transfer: optimal protocols and their experimental implementations
Non-interactive XOR quantum oblivious transfer: optimal protocols and their experimental implementations Open
Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver Bob obtai…
View article: Unconditionally secure digital signatures implemented in an eight-user quantum network*
Unconditionally secure digital signatures implemented in an eight-user quantum network* Open
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol …
View article: Experimental demonstration of optimal unambiguous two-out-of-four quantum state elimination
Experimental demonstration of optimal unambiguous two-out-of-four quantum state elimination Open
A core principle of quantum theory is that non-orthogonal quantum states cannot be perfectly distinguished with single-shot measurements. However, it is possible to exclude a subset of non-orthogonal states without error in certain circums…
View article: Unconditionally secure digital signatures implemented in an 8-user quantum network
Unconditionally secure digital signatures implemented in an 8-user quantum network Open
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol …
View article: A group-theoretic approach to elimination measurements of qubit sequences
A group-theoretic approach to elimination measurements of qubit sequences Open
Most measurements are designed to tell you which of several alternatives have occurred, but it is also possible to make measurements that eliminate possibilities and tell you an alternative that did not occur. Measurements of this type hav…
View article: A group-theoretic approach to elimination measurements
A group-theoretic approach to elimination measurements Open
Most measurements are designed to tell you which of several alternatives have occurred, but it is also possible to make measurements that eliminate possibilities and tell you an alternative that did not occur. Measurements of this type hav…
View article: Optimal simultaneous measurements of incompatible observables of a single photon
Optimal simultaneous measurements of incompatible observables of a single photon Open
The ultimate limits of measurement precision are dictated by the laws of quantum mechanics. One of the most fascinating results is that joint or simultaneous measurements of noncommuting quantum observables are possible at the cost of incr…
View article: Optimal simultaneous measurements of incompatible observables of a single photon
Optimal simultaneous measurements of incompatible observables of a single photon Open
Joint or simultaneous measurements of non-commuting quantum observables are possible at the cost of increased unsharpness or measurement uncertainty. Many different criteria exist for defining what an "optimal" joint measurement is, with c…
View article: Optimal simultaneous measurements of incompatible observables of a\n single photon
Optimal simultaneous measurements of incompatible observables of a\n single photon Open
Joint or simultaneous measurements of non-commuting quantum observables are\npossible at the cost of increased unsharpness or measurement uncertainty. Many\ndifferent criteria exist for defining what an "optimal" joint measurement is,\nwit…
View article: Experimental measurement-device-independent quantum digital signatures
Experimental measurement-device-independent quantum digital signatures Open
The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-theoretic security, requiring both qua…
View article: Ancilla-driven quantum computation for qudits and continuous variables
Ancilla-driven quantum computation for qudits and continuous variables Open
Although qubits are the leading candidate for the basic elements in a quantum computer, there are also a range of reasons to consider using higher-dimensional qudits or quantum continuous variables (QCVs). In this paper, we use a general “…
View article: Experimental measurement-device-independent quantum digital signatures over a metropolitan network
Experimental measurement-device-independent quantum digital signatures over a metropolitan network Open
Quantum digital signatures (QDS) provide a means for signing electronic\ncommunications with informationtheoretic security. However, all previous\ndemonstrations of quantum digital signatures assume trusted measurement\ndevices. This rende…
View article: Observation of pair tunneling and coherent destruction of tunneling in arrays of optical waveguides
Observation of pair tunneling and coherent destruction of tunneling in arrays of optical waveguides Open
We report on the experimental realization of a photonic system that simulates\nthe one-dimensional two-particle Hubbard model. This analogy is realized by\nmeans of two-dimensional arrays of coupled optical waveguides, fabricated using\nfe…
View article: Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system
Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system Open
Quantum digital signatures (QDSs) apply quantum mechanics to the problem of guaranteeing message integrity and non-repudiation with information-theoretical security, which are complementary to the confidentiality realized by quantum key di…
View article: Free-Space Quantum Signatures Using Heterodyne Measurements
Free-Space Quantum Signatures Using Heterodyne Measurements Open
Digital signatures guarantee the authorship of electronic communications. Currently used "classical" signature schemes rely on unproven computational assumptions for security, while quantum signatures rely only on the laws of quantum mecha…
View article: Measurement-device-independent quantum digital signatures
Measurement-device-independent quantum digital signatures Open
Digital signatures play an important role in software distribution, modern\ncommunication and financial transactions, where it is important to detect\nforgery and tampering. Signatures are a cryptographic technique for validating\nthe auth…
View article: Experimental simulation of two interacting particles in a one-dimensional lattice
Experimental simulation of two interacting particles in a one-dimensional lattice Open
We report on the experimental realization of a photonic system that simulates the dynamics of two interacting quantum particles in a one-dimensional lattice. This analogy is realized by means of two-dimensional arrays of coupled optical wa…
View article: Multiparty quantum signature schemes
Multiparty quantum signature schemes Open
Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptograp…