These lectures are an introduction to the interplay between quantum information and cryptography; with a focus on the areas where security is achieved against unbounded adversaries. Topics include:
-Wiesner Quantum Money
-Impossibility of quantum bit commitment -Secure delegated quantum computation -"Sampling in a Quantum Population"
-Quantum Key Distribution
-Quantum Certified Deletion
References:
Wiesner, S. (1983). Conjugate coding. ACM Sigact News, 15(1), 78-88. https://dl.acm.org/doi/pdf/10.1145/1008908.1008920
Watrous, J. Lecture 19: Impossibility of Quantum Bit Commitment. https://cs.uwaterloo.ca/~watrous/QC-notes/QC-notes.19.pdf
Broadbent, A. (2015). Delegating private quantum computations. Canadian Journal of Physics, 93(9), 941-946.
https://doi.org/10.1139/cjp-2015-0030
Bouman, N. J., & Fehr, S. (2010, August). Sampling in a quantum population, and applications. In Annual Cryptology Conference (pp. 724-741).
https://link.springer.com/chapter/10.1007/978-3-642-14623-7_39
Bennett, C. H., & Brassard, G. (2020). Quantum cryptography: Public key distribution and coin tossing. https://arxiv.org/ftp/arxiv/papers/2003/2003.06557.pdf
Broadbent, A., & Islam, R. (2020, November). Quantum encryption with certified deletion. In Theory of Cryptography Conference (pp. 92-122).
https://link.springer.com/chapter/10.1007/978-3-030-64381-2_4