Table of contents

  • This session has been presented May 12, 2006.

Description

  • Speaker

    Serge Fehr - CWI Amsterdam

Most of todays cryptography relies on the assumption that a potential attacker cannot solve some computational problem (e.g. factor a large integer). It has been shown in the early 80's that with the use of quantum-mechanical effects, certain cryptographic tasks can be done unconditionally, i.e., secure against computationally unbounded attackers: Quantum-cryptography, and with it the hope that (m)any cryptographic task(s) can be solved this way, was born. This hope was smashed in the late 90's, when it was shown that any non-trivial cryptographic task involving two mutually distrusted parties cannot be done unconditionally by means of quantum-cryptography.<br/> We propose a new approach to circumvent this impossibility result. We construct quantum-cryptographic schemes which are secure under the sole assumption that the attacker's quantum memory is limited. This is motivated by the fact that storing even a single qubit for more than a fraction of a second seems to be out of reach with today's technology. This approach allows for practical schemes for Oblivious Transfer and for Bit Commitment.<br/> (Joint work with Ivan Damgård, Louis Salvail and Christian Schaffner)

Next sessions

  • Journées C2: pas de séminaire

    • April 03, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

  • Endomorphisms via Splittings

    • April 10, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Min-Yi Shen - No Affiliation

    One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]
    • Cryptography

Show previous sessions