A Constant Lower Bound for Any Quantum Protocol for Secure Function Evaluation.
Sarah A. OsbornJamie SikoraPublished in: TQC (2022)
Keyphrases
- lower bound
- upper bound
- cryptographic protocols
- authentication protocol
- lightweight
- covert channel
- np hard
- security analysis
- scalar product
- optimal solution
- lower and upper bounds
- rfid systems
- secure multiparty computation
- key exchange
- group communication
- key distribution
- security protocols
- branch and bound algorithm
- security properties
- worst case
- quantum mechanics
- key exchange protocol
- privacy preserving
- key agreement
- security mechanisms