Skip to main content

Showing 1–10 of 10 results for author: Souto, A

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2305.14252  [pdf, other

    quant-ph cs.CC math-ph

    Quantum Kolmogorov complexity and quantum correlations in deterministic-control quantum Turing machines

    Authors: Mariano Lemus, Ricardo Faleiro, Paulo Mateus, Nikola Paunković, André Souto

    Abstract: This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it… ▽ More

    Submitted 15 January, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: 29 pages, 2 figures

    Journal ref: Quantum 8, 1230 (2024)

  2. arXiv:2001.11911  [pdf, ps, other

    quant-ph cs.CR

    A Private Quantum Bit String Commitment

    Authors: Mariana Gama, Paulo Mateus, André Souto

    Abstract: We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticat… ▽ More

    Submitted 31 January, 2020; originally announced January 2020.

    Comments: 8 pages, 4 figures

  3. arXiv:1909.11701  [pdf, other

    quant-ph cs.CR

    Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

    Authors: Mariano Lemus, Mariana F. Ramos, Preeti Yadav, Nuno A. Silva, Nelson J. Muga, Andre Souto, Nikola Paunkovic, Paulo Mateus, Armando N. Pinto

    Abstract: The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us… ▽ More

    Submitted 17 June, 2020; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: 11 pages, 5 figures

    Journal ref: Appl. Sci. 2020, 10(12), 4080

  4. Experimental Semi-quantum Key Distribution With Classical Users

    Authors: Francesco Massa, Preeti Yadav, Amir Moqanaki, Walter O. Krawec, Paulo Mateus, Nikola Paunković, André Souto, Philip Walther

    Abstract: Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic… ▽ More

    Submitted 18 September, 2022; v1 submitted 5 August, 2019; originally announced August 2019.

    Comments: Version accepted by Quantum - 9 pages, 4 figures + Appendix (16 pages, 4 figures)

    Journal ref: Quantum 6, 819 (2022)

  5. Quantum contract signing with entangled pairs

    Authors: P. Yadav, P. Mateus, N. Paunković, A. Souto

    Abstract: We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can o… ▽ More

    Submitted 3 September, 2019; v1 submitted 27 November, 2017; originally announced November 2017.

    Comments: 24 pages, 10 figures

    Journal ref: Entropy 21, 821 (2019)

  6. Quantum key distribution with quantum walks

    Authors: Chrysoula Vlachou, Walter Krawec, Paulo Mateus, Nikola Paunkovic, Andre Souto

    Abstract: Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle att… ▽ More

    Submitted 3 October, 2018; v1 submitted 22 October, 2017; originally announced October 2017.

    Comments: published version; 40 pages; 8 figures

    Journal ref: Quantum Information Processing 17:288, 2018

  7. arXiv:1709.01387  [pdf, ps, other

    quant-ph cs.FL

    Quantum machines with classical control

    Authors: Paulo Mateus, Daowen Qiu, Andre Souto

    Abstract: Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:0909.1428

    Journal ref: Logic and Computation: Essays in Honour of Amilcar Sernadas. College Publications, London, 2017. p. 271--302

  8. Quantum walks public key cryptographic system

    Authors: C. Vlachou, J. Rodrigues, P. Mateus, N. Paunković, A. Souto

    Abstract: Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol t… ▽ More

    Submitted 3 February, 2016; originally announced February 2016.

    Journal ref: International Journal of Quantum Information, Vol. 13, No. 6 (2015) 1550050

  9. Oblivious transfer based on single-qubit rotations

    Authors: J. Rodrigues, P. Mateus, N. Paunković, A. Souto

    Abstract: We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing o… ▽ More

    Submitted 4 September, 2017; v1 submitted 30 July, 2014; originally announced July 2014.

    Journal ref: Journal of Physics A: Mathematical and Theoretical, Volume 50, Number 20, 2017

  10. arXiv:1403.6022  [pdf, ps, other

    quant-ph cs.CR math-ph

    Oblivious transfer based on quantum state computational distinguishability

    Authors: A. Souto, P. Mateus, P. Adão, N. Paunković

    Abstract: Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not. Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that fa… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.