The quantum computer for accelerating image processing and strengthening the security of information systems

T Nouioua, AH Belbachir - Chinese Journal of Physics, 2023 - Elsevier
Many researchers and laboratories have been involved for many years in the development
of the quantum computer. In 2019, Google has announced that they have reached quantum …

Secure software leasing without assumptions

A Broadbent, S Jeffery, S Lord, S Podder… - Theory of Cryptography …, 2021 - Springer
Quantum cryptography is known for enabling functionalities that are unattainable using
classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one …

Quantum State Obfuscation from Classical Oracles

J Bartusek, Z Brakerski, V Vaikuntanathan - Proceedings of the 56th …, 2024 - dl.acm.org
A major unresolved question in quantum cryptography is whether it is possible to obfuscate
arbitrary quantum computation. Indeed, there is much yet to understand about the feasibility …

Can you sign a quantum state?

G Alagic, T Gagliardoni, C Majenz - Quantum, 2021 - quantum-journal.org
Cryptography with quantum states exhibits a number of surprising and counterintuitive
features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures …

The quantum computer and the security of information systems

N Tarek, BA Hafid - … on Recent Advances in Mathematics and …, 2021 - ieeexplore.ieee.org
Many researchers and laboratories have been engaged for years in a competition for a
single objective, which is the quantum computer. Recently, Google has announced that it …

An efficient combination of quantum error correction and authentication

Y Dulek, G Muguruza, F Speelman - arXiv preprint arXiv:2211.09686, 2022 - arxiv.org
When sending quantum information over a channel, we want to ensure that the message
remains intact. Quantum error correction and quantum authentication both aim to protect …

Password authentication schemes on a quantum computer

S Wang, C Adams, A Broadbent - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
In a post-quantum world, where attackers may have access to full-scale quantum computers,
all classical password-based authentication schemes will be compromised. Quantum copy …

[PDF][PDF] The Security of Information Systems and Image Processing Supported by the Quantum Computer: A review

T Nouioua, A Belbachir - Advances in Science, Technology and …, 2022 - researchgate.net
The knowledge and understanding of the technology of quantum computers and their
superiority over classical computers are still insufficient or uncertain for many communities of …

[HTML][HTML] Delegated and Distributed Quantum Computation

Y Dulek - 2020 - eprints.illc.uva.nl
This dissertation explores the possibilities and impossibilities of securely delegating and
distributing quantum computations. We construct explicit protocols for several quantum …