scispace - formally typeset
S

Serge Fehr

Researcher at Centrum Wiskunde & Informatica

Publications -  130
Citations -  4845

Serge Fehr is an academic researcher from Centrum Wiskunde & Informatica. The author has contributed to research in topics: Quantum cryptography & Secret sharing. The author has an hindex of 37, co-authored 124 publications receiving 4184 citations. Previous affiliations of Serge Fehr include BRICS & Georgia Institute of Technology.

Papers
More filters
Journal ArticleDOI

On quantum Rényi entropies: A new generalization and some properties

TL;DR: This work proposes a new quantum generalization of the family of Renyi entropies that contains the von Neumann entropy, min-entropy, collision entropy, and the max-entropies as special cases, thus encompassing most quantum entropie in use today.
Book ChapterDOI

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

TL;DR: Algebraic manipulation detection (AMD) as discussed by the authors is a new primitive that encodes a source s into a value x stored on a storage device so that any tampering by an adversary will be detected.
Book ChapterDOI

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles

TL;DR: This work proposes a slightly weaker notion of security, saying that no partial information about encrypted messages should be leaked as long as each message is a-priori hard-to-guess given the others, and shows equivalence of this definition to single-message and indistinguishability-based ones, which are easier to work with.
Proceedings ArticleDOI

Cryptography in the bounded quantum-storage model

TL;DR: In this paper, the authors study two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size, and show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted.
Journal ArticleDOI

On the Conditional Rényi Entropy

TL;DR: This paper reconsiders the definition for the conditional Rényi entropy of general order as proposed by Arimoto in the seventies, and shows that this particular notion satisfies several natural properties, including monotonicity under conditioning and chain rule.