• No results found

Cryptography in a quantum world - Titlepage

N/A
N/A
Protected

Academic year: 2021

Share "Cryptography in a quantum world - Titlepage"

Copied!
9
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl)

UvA-DARE (Digital Academic Repository)

Cryptography in a quantum world

Wehner, S.D.C.

Publication date 2008

Link to publication

Citation for published version (APA):

Wehner, S. D. C. (2008). Cryptography in a quantum world.

General rights

It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons).

Disclaimer/Complaints regulations

If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.

(2)
(3)

ILLC Dissertation Series DS-2008-01

For further information about ILLC-publications, please contact

Institute for Logic, Language and Computation Universiteit van Amsterdam

Plantage Muidergracht 24 1018 TV Amsterdam phone: +31-20-525 6051 fax: +31-20-525 5206 e-mail: illc@science.uva.nl homepage: http://www.illc.uva.nl/

(4)

Cryptography in a Quantum World

Academisch Proefschrift

ter verkrijging van de graad van doctor aan de

Universiteit van Amsterdam

op gezag van de Rector Magnificus

prof.dr. D.C. van den Boom

ten overstaan van een door het college voor

promoties ingestelde commissie, in het openbaar

te verdedigen in de Agnietenkapel

op woensdag 27 februari 2008, te 14.00 uur

door

Stephanie Dorothea Christine Wehner

(5)

Promotiecommissie:

Promotor: prof.dr. H.M. Buhrman

Overige leden: prof.dr.ir. F.A. Bais prof.dr. R.J.F. Cramer prof.dr. R.H. Dijkgraaf prof.dr. A.J. Winter dr. R.M. de Wolf

Faculteit der Natuurwetenschappen, Wiskunde en Informatica

The investigations were supported by EU projects RESQ IST-2001-37559, QAP IST 015848 and the NWO vici project 2004-2009.

Copyright c 2008 by Stephanie Wehner Cover design by Frans Bartels.

Printed and bound by PrintPartners Ipskamp.

(6)

Parts of this thesis are based on material contained in the following papers:

• Cryptography from noisy storage

S. Wehner, C. Schaffner, and B. Terhal Submitted

(Chapter 11)

• Higher entropic uncertainty relations for anti-commuting

observ-ables

S. Wehner and A. Winter Submitted

(Chapter 4)

• Security of Quantum Bit String Commitment depends on the

in-formation measure

H. Buhrman, M. Christandl, P. Hayden, H.K. Lo and S. Wehner In Physical Review Letters, 97, 250501 (2006)

(long version submitted to Physical Review A) (Chapter 10)

• State Discrimination with Post-Measurement Information

M. Ballester, S. Wehner and A. Winter

To appear in IEEE Transactions on Information Theory (Chapter 3)

• Entropic uncertainty relations and locking: tight bounds for

mu-tually unbiased bases

M. Ballester and S. Wehner

In Physical Review A, 75, 022319 (2007) (Chapters 4 and 5)

• Tsirelson bounds for generalized CHSH inequalities

S. Wehner

In Physical Review A, 73, 022110 (2006) (Chapter 7)

• Entanglement in Interactive Proof Systems with Binary Answers

S. Wehner

In Proceedings of STACS 2006, LNCS 3884, pages 162-171 (2006) (Chapter 9)

Other papers to which the author contributed during her time as a PhD student:

(7)

• The quantum moment problem

A. Doherty, Y. Liang, B. Toner and S. Wehner Submitted

• Security in the Bounded Quantum Storage Model

S. Wehner and J. Wullschleger Submitted

• A simple family of non-additive codes

J.A. Smolin, G. Smith and S. Wehner

In Physical Review Letters, 99, 130505 (2007)

• Analyzing Worms and Network Traffic using Compression

S. Wehner

Journal of Computer Security, Vol 15, Number 3, 303-320 (2007)

• Implications of Superstrong Nonlocality for Cryptography

H. Buhrman, M. Christandl, F. Unger, S. Wehner and A. Winter

In Proceedings of the Royal Society A, vol. 462 (2071), pages 1919-1932 (2006)

• Quantum Anonymous Transmissions

M. Christandl and S. Wehner

In Proceedings of ASIACRYPT 2005, LNCS 3788, pages 217-235 (2005)

(8)

C’est v´eritablement utile puisque c’est joli.

Le Petit Prince, Antoine de Saint-Exup´ery

(9)

Referenties

GERELATEERDE DOCUMENTEN

The definition is sim ply stated as: “Entrepreneurship describes the econom ic activity undertaken by social individuals in their pursuit o f self- identity.” The definition

The goal of the research is to recommend appropriate water rate structures and strategies to achieve water pricing principles for BC that encompass economic efficiency,

Taking these health status factors into account, our findings also revealed that those who experienced greater declines in ADL functioning over time were more likely to

At the end of this unit, students will share their thoughts and feelings pertaining to specific images in a minimum of two wordless picturebooks, use a rich vocabulary (with

Linear algebra 2: exercises for Chapter 2 (Direct sums).. You may use Theorem 3.1 (Cayley-Hamilton) for

De aantrekkelijkheid van deze methode ligt voor de hand: werknemers zijn direct betrokken bij de inrichting van de medezeggenschap voor hun eigen bedrijf, maatwerk

Daarnaast moet dit systeem worden aange­ past aan de gedachte dat iedereen, op welk mo­ ment in zijn of haar loopbaan dan ook, indien gewenst weer aansluiting bij het

voor het verschijnen van de M iljoenennota pu­ bliceerde het bureau een internationaal verge­ lijkende studie naar de inrichting en werking van het sociaal-economisch