Search Results

Documents authored by Bouda, Jan


Document
Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source

Authors: Jan Bouda, Marcin Pawlowski, Matej Pivoluska, and Martin Plesch

Published in: LIPIcs, Volume 27, 9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014)


Abstract
In this paper we design a protocol to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy block source in a device independent setting. The protocol employs Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the block n, containing entropy of at least two bits. Our protocol is robust, it can tolerate devices that malfunction with a probability dropping polynomially in n at the cost of constant increase of the number of devices used.

Cite as

Jan Bouda, Marcin Pawlowski, Matej Pivoluska, and Martin Plesch. Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source. In 9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014). Leibniz International Proceedings in Informatics (LIPIcs), Volume 27, pp. 205-211, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@InProceedings{bouda_et_al:LIPIcs.TQC.2014.205,
  author =	{Bouda, Jan and Pawlowski, Marcin and Pivoluska, Matej and Plesch, Martin},
  title =	{{Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source}},
  booktitle =	{9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014)},
  pages =	{205--211},
  series =	{Leibniz International Proceedings in Informatics (LIPIcs)},
  ISBN =	{978-3-939897-73-6},
  ISSN =	{1868-8969},
  year =	{2014},
  volume =	{27},
  editor =	{Flammia, Steven T. and Harrow, Aram W.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.TQC.2014.205},
  URN =		{urn:nbn:de:0030-drops-48164},
  doi =		{10.4230/LIPIcs.TQC.2014.205},
  annote =	{Keywords: Randomness Extraction, Device Independence}
}
Document
Quantum key distribution and cryptography: a survey

Authors: Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Slavail, Michel Riguidel, Andrew Shilds, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John Rarity, Harald Weinfurter, Anton Zeilinger, and Christian Monyk

Published in: Dagstuhl Seminar Proceedings, Volume 9311, Classical and Quantum Information Assurance Foundations and Practice (2010)


Abstract
I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ? I will in particular cover the following topics - practical performances of QKD - QKD network deployment - SECOQC project - Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements - Quantum information and Side-channels - QKD security assurance - Thoughts about "real" Post-Quantum Cryptography

Cite as

Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Slavail, Michel Riguidel, Andrew Shilds, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John Rarity, Harald Weinfurter, Anton Zeilinger, and Christian Monyk. Quantum key distribution and cryptography: a survey. In Classical and Quantum Information Assurance Foundations and Practice. Dagstuhl Seminar Proceedings, Volume 9311, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{alleaume_et_al:DagSemProc.09311.3,
  author =	{All\'{e}aume, Romain and L\"{u}tkenhaus, Norbert and Renner, Renato and Grangier, Philippe and Debuisschert, Thierry and Ribordy, Gregoire and Gisin, Nicolas and Painchault, Philippe and Pornin, Thomas and Slavail, Louis and Riguidel, Michel and Shilds, Andrew and L\"{a}nger, Thomas and Peev, Momtchil and Dianati, Mehrdad and Leverrier, Anthony and Poppe, Andreas and Bouda, Jan and Branciard, Cyril and Godfrey, Mark and Rarity, John and Weinfurter, Harald and Zeilinger, Anton and Monyk, Christian},
  title =	{{Quantum key distribution and cryptography: a survey}},
  booktitle =	{Classical and Quantum Information Assurance Foundations and Practice},
  pages =	{1--29},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{9311},
  editor =	{Samual L. Braunstein and Hoi-Kwong Lo and Kenny Paterson and Peter Ryan},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09311.3},
  URN =		{urn:nbn:de:0030-drops-23618},
  doi =		{10.4230/DagSemProc.09311.3},
  annote =	{Keywords: QKD, QKD networks, Security assurance, Post-Quantum Cryptography}
}
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail