In known security reductions for the Fujisaki-Okamoto transformation,
de...
Commit-and-open Sigma-protocols are a popular class of protocols for
con...
In theoretical computer science, conferences play an important role in t...
We study uncloneable quantum encryption schemes for classical messages a...
Quantum-access security, where an attacker is granted superposition acce...
We show the following generic result. Whenever a quantum query algorithm...
The random oracle model (ROM) enjoys widespread popularity, mostly becau...
Copy-protection allows a software distributor to encode a program in suc...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu an...
Unitary t-designs are the bread and butter of quantum information theory...
We consider the problem of efficiently simulating random quantum states ...
The cryptographic task of secure multi-party (classical) computation has...
Non-malleability is an important security property for public-key encryp...
Game-playing proofs constitute a powerful framework for classical
crypto...
The famous Fiat-Shamir transformation turns any public-coin three-round
...
Cryptography with quantum states exhibits a number of surprising and
cou...
The von Neumann entropy plays a vital role in quantum information theory...
In this Thesis, several results in quantum information theory are collec...
Insights from quantum information theory show that correlation measures ...
We consider the problem of unforgeable authentication of classical messa...