Dear All,
This weeks research day on THURSDAY will be at the Computer Science
Building CAB. Note the different day, time and building.
Speaker: Frederic Dupuis
Title: Secure Two-Party Quantum Evaluation of Unitaries Against Specious
Adversaries
Time: 3 pm
Place: CAB H 52
Abstract:
We show that any two-party quantum computation, specified by a unitary
which simultaneously acts on the registers of both parties, can be
securely implemented against a quantum version of classical semi-honest …
[View More]
adversaries that we call specious.
We first show that no statistically private protocol exists for swapping
qubits against specious adversaries. The swap functionality is modeled
by a unitary transform that is not sufficient for universal quantum
computation. It means that universality is not required in order to
obtain impossibility proofs in our model. However, the swap transform
can easily be implemented privately provided a classical bit commitment
scheme.
We provide a simple protocol for the evaluation of any unitary transform
represented by a circuit made out of gates in some standard universal
set of quantum gates. All gates except one can be implemented securely
provided one call to swap made available as an ideal functionality. For
each appearance of the remaining gate in the circuit, one call to a
classical NL-box is required for privacy. The NL-box can easily be
constructed from oblivious transfer. It follows that oblivious transfer
is universal for private evaluations of unitaries as well as for
classical circuits.
Unlike the ideal swap, NL-boxes are classical primitives and cannot be
represented by unitary transforms. It follows that, to some extent,
this remaining gate is the hard one, like the AND gate for classical
two-party computation.
Joint work with Jesper Buus Nielsen (Aarhus University) and Louis
Salvail (University of Montreal)
Cheers,
Dejan
[View Less]
Dear All,
This weeks research day on THURSDAY will be at the Computer Science
Building CAB. Note the different day, time and building.
Speaker: Frederic Dupuis
Title: TBA
Time: 2 pm
Place: CAB H 52
Abstract: TBA
Cheers,
Dejan
Dear All,
This weeks research day on THURSDAY will be at the Computer Science
Building CAB. Note the different day, time and building.
Speaker: Frederic Dupuis
Title: TBA
Time: 2 pm
Place: CAB H 52
Abstract: TBA
Cheers,
Dejan
Hi all,
There will be 1.5 additional talks this week by our guests (the second
is apparently only half a talk). They will be on Thursday starting at
16:00 in HIT K51.
Borivoje Dakic
"Quantum theory and beyond: is entanglement special?"
Caslav Brukner
"Impossibility of 'mirror' quantum mechanics"
Cheers,
Roger
Hi all,
Next Tuesday we will have a talk by one of our visitors, Vladko Vedral.
Title: Relative entropy of quantum and classical correlations
Tuesday, February 16, 2010, 17:00h, HIT K51.
See you there,
Roger
Hi all,
Tomorrow's talk will be by Normand Beaudry on "Squashing Models for
Optical Measurements in Quantum Communication". It's at 5pm in HIT K 51.
See you there,
Roger
Dear All,
This weeks research day on Tuesday will be at the Computer Science
Building. Note that we have moved to a new building, the CAB!
Furthermore, there is NO locked door anymore :-) In case you want to
visit our new offices (we also have several free workplaces) we are
located on the F-floor:
Stefan: CAB F 52
Matthias: CAB F 52.1
Esther: CAB F 51
Manuel + Viktor: CAB F 51.1
Severin + Dejan: CAB F 39
Speaker: Esther Haenggi
Title: Privacy Amplification of Non-Signaling Boxes
Time: 5 …
[View More]pm
Place: CAB H 53
Abstract:
I will talk about our recent result on privacy amplification of
non-signaling secrecy. The talk will have two parts: the first part is
an introduction to how 'boxes' are related to quantum key distribution.
This part should be extremely basic and, therefore, boring for people
actually working on boxes (but on the other hand understandable for
people NOT working on them). The second part will be about the actual
result that non-signaling secrecy can be enhanced by taking the XOR of
partially secure bits and how this leads to a key-distribution scheme.
This part is more technical. I will clearly mark the transition between
the two parts and you are, of course, welcome to attend either, both or
neither of the parts.
Cheers,
Dejan
[View Less]