Dispelling myths on superposition attacks: formal security model and attack analyses

With the emergence of quantum communication, it is of folkloric belief that the security of classical cryptographic protocols is automatically broken if the Adversary is allowed to perform superposition queries and the honest players forced to perform actions coherently on quantum states. Another wi...

Full description

Saved in:
Bibliographic Details
Published in:Designs, codes, and cryptography Vol. 90; no. 4; pp. 881 - 920
Main Authors: Music, Luka, Chevalier, Céline, Kashefi, Elham
Format: Journal Article
Language:English
Published: New York Springer US 01.04.2022
Springer Nature B.V
Springer Verlag
Subjects:
ISSN:0925-1022, 1573-7586
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first