Voor de beste ervaring schakelt u JavaScript in en gebruikt u een moderne browser!
Je gebruikt een niet-ondersteunde browser. Deze site kan er anders uitzien dan je verwacht.

Dr. C. (Christian) Schaffner

Faculteit der Natuurwetenschappen, Wiskunde en Informatica
ILLC
Fotograaf: onbekend

Bezoekadres
  • Science Park 105
  • Kamernummer: F2.41
Postadres
  • Postbus 94242
    1090 GE Amsterdam
  • Profile

    Positions

    Associate Professor (UHD) at Institute for Logic, Language and Computation (ILLC)

    Member of QuSoft, Research Center for Quantum Software

    Chairman of Quantum.Amsterdam, innovation hub for quantum softawre, technology and applications

    Chairman of the Talent & Outreach committee of the Quantum Software Consortium.

    Personal Homepage

    personal homepage at https://staff.science.uva.nl/c.schaffner/

  • Publicaties

    2020

    • Dulek, Y., Grilo, A. B., Jeffery, S., Majenz, C., & Schaffner, C. (2020). Secure multi-party quantum computation with a dishonest majority. In A. Canteaut, & Y. Ishai (Eds.), Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020 : proceedings (Vol. III, pp. 729-758). (Lecture Notes in Computer Science; Vol. 12107). Springer. https://doi.org/10.1007/978-3-030-45727-3_25 [details]
    • Landerreche, E., Stevens, M., & Schaffner, C. (2020). Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions. In J. Bonneau, & N. Heninger (Eds.), Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10–14, 2020, Revised Selected Papers (pp. 541-558). (Lecture Notes in Computer Science; No. 12059). Springer. https://doi.org/10.1007/978-3-030-51280-4_29 [details]

    2019

    • Coopmans, T., Kaniewski, J., & Schaffner, C. (2019). Robust self-testing of two-qubit states. Physical Review A, 99(5), [052123]. https://doi.org/10.1103/PhysRevA.99.052123 [details]
    • Czajkowski, J., Hülsing, A., & Schaffner, C. (2019). Quantum Indistinguishability of Random Sponges. In A. Boldyreva, & D. Micciancio (Eds.), Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019 : proceedings (Vol. 2, pp. 296-325). (Lecture Notes in Computer Science; Vol. 11693). Springer. https://doi.org/10.1007/978-3-030-26951-7_11 [details]
    • Don, J., Fehr, S., Majenz, C., & Schaffner, C. (2019). Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. In A. Boldyreva, & D. Micciancio (Eds.), Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019 : proceedings (Vol. 2, pp. 356-383). (Lecture Notes in Computer Science; Vol. 11693). Springer. https://doi.org/10.1007/978-3-030-26951-7_13 [details]

    2018

    2017

    • Alagic, G., Dulek, Y., Schaffner, C., & Speelman, F. (2017). Quantum Fully Homomorphic Encryption with Verification. In T. Takagi, & T. Peyrin (Eds.), Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings (Vol. 1, pp. 438-467). (Lecture Notes in Computer Science; Vol. 10624). Springer. https://doi.org/10.1007/978-3-319-70694-8_16 [details]
    • Santoli, T., & Schaffner, C. (2017). Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives. Quantum Information and Computation, 17(1&2), 65-78. https://arxiv.org/abs/1603.07856 [details]

    2016

    • Alagic, G., Broadbent, A., Fefferman, B., Gagliardoni, T., Schaffner, C., & St. Jules, M. (2016). Computational security of quantum encryption. In A. C. A. Nascimento, & P. Barreto (Eds.), Information Theoretic Security: 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016 : revised selected papers (pp. 47-71). (Lecture Notes in Computer Science; Vol. 10015). Springer. https://doi.org/10.1007/978-3-319-49175-2_3 [details]
    • Broadbent, A., & Schaffner, C. (2016). Quantum cryptography beyond quantum key distribution. Designs, Codes and Cryptography, 78(1), 351-382. https://doi.org/10.1007/s10623-015-0157-4 [details]
    • Dulek, Y., Schaffner, C., & Speelman, F. (2016). Quantum homomorphic encryption for polynomial-sized circuits. In M. Robshaw, & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings (Vol. 3, pp. 3-32). (Lecture Notes in Computer Science; Vol. 9816). Springer. https://doi.org/10.1007/978-3-662-53015-3_1 [details]
    • Gagliardoni, T., Hülsing, A., & Schaffner, C. (2016). Semantic security and indistinguishability in the quantum world. In M. Robshaw, & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings (Vol. 3, pp. 60-89). (Lecture Notes in Computer Science; Vol. 9816). Springer. https://doi.org/10.1007/978-3-662-53015-3_3 [details]

    2015

    2014

    • Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., & Schaffner, C. (2014). Position-based quantum cryptography: Impossibility and constructions. SIAM Journal on Computing, 43(1), 150-178. https://doi.org/10.1137/130913687 [details]
    • Buhrman, H., Fehr, S., & Schaffner, C. (2014). On the Parallel Repetition of Multi-Player Games: The No-Signaling Case. In S. T. Flammia, & A. W. Harrow (Eds.), 9th Conference on the Theory of Quantum Computation, Communication and Cryptography: TQC 2014, May 21-23, 2014, National University of Singapore, Singapore (pp. 24-35). (Leibniz International Proceedings in Informatics; Vol. 27). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.TQC.2014.24 [details]
    • Damgård, I., Fehr, S., Salvail, L., & Schaffner, C. (2014). Secure identification and QKD in the bounded-quantum-storage model. Theoretical Computer Science, 560(1), 12-26. https://doi.org/10.1016/j.tcs.2014.09.014 [details]

    2013

    • Bouman, N. J., Fehr, S., González-Guillén, C., & Schaffner, C. (2013). An all-but-one entropic uncertainty relation, and application to password-based identification. In K. Iwama, Y. Kawano, & M. Murao (Eds.), Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012: revised selected papers (pp. 29-44). (Lecture Notes in Computer Science; Vol. 7582). Springer. https://doi.org/10.1007/978-3-642-35656-8_3 [details]
    • Buhrman, H., Fehr, S., Schaffner, C., & Speelman, F. (2013). The Garden-Hose Model. In ITCS'13: proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science : January 9-12, 2013, Berkeley, California, USA (pp. 145-157). Association for Computing Machinery. https://doi.org/10.1145/2422436.2422455 [details]
    • Buhrman, H., van der Gulik, P. T. S., Klau, G. W., Schaffner, C., Speijer, D., & Stougie, L. (2013). A Realistic Model Under Which the Genetic Code is Optimal. Journal of molecular evolution, 77(4), 170-184. https://doi.org/10.1007/s00239-013-9571-2 [details]
    • Fehr, S., Gelles, R., & Schaffner, C. (2013). Security and Composability of Randomness Expansion from Bell Inequalities. Physical Review A, 87(1), [012335]. https://doi.org/10.1103/PhysRevA.87.012335 [details]

    2012

    2011

    • Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., & Zhandry, M. (2011). Random Oracles in a Quantum World. In D. H. Lee, & X. Wang (Eds.), Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011 : proceedings (pp. 41-69). (Lecture Notes in Computer Science; Vol. 7073). Springer. https://doi.org/10.1007/978-3-642-25385-0_3 [details]
    • Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., & Schaffner, C. (2011). Position-based quantum cryptography: impossibility and constructions. In P. Rogaway (Ed.), Advances in Cryptology – CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011: proceedings (pp. 429-446). (Lecture Notes in Computer Science; Vol. 6841). Springer. https://doi.org/10.1007/978-3-642-22792-9_24 [details]
    • Tomamichel, M., Schaffner, C., Smith, A., & Renner, R. (2011). Leftover Hashing Against Quantum Side Information. IEEE Transactions on Information Theory, 57(8), 5524-5535. https://doi.org/10.1109/TIT.2011.2158473 [details]

    2010

    2009

    • Damgård, I., Fehr, S., Lunemann, C., Salvail, L., & Schaffner, C. (2009). Improving the security of quantum protocols via commit-and-open. In Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings (pp. 408-427). (Lecture Notes in Computer Science; Vol. 5677). Springer. https://doi.org/10.1007/978-3-642-03356-8_24
    • Fehr, S., & Schaffner, C. (2009). Composing quantum protocols in a classical environment. In Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings (pp. 350-367). (Lecture Notes in Computer Science; Vol. 5444). Springer. https://doi.org/10.1007/978-3-642-00457-5_21
    • König, R., Renner, R., & Schaffner, C. (2009). The operational meaning of min- and max-entropy. IEEE Transactions on Information Theory, 55(9), 4337-4347. https://doi.org/10.1109/TIT.2009.2025545
    • Salvail, L., Schaffner, C., & Sotáková, M. (2009). On the power of two-party quantum cryptography. In Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 70-87). (Lecture Notes in Computer Science; Vol. 5912). Springer. https://doi.org/10.1007/978-3-642-10366-7_5
    • Schaffner, C., Terhal, B., & Wehner, S. (2009). Robust cryptography in the noisy-quantum-storage model. Quantum Information and Computation, 9(11-12), 963-996. https://doi.org/10.26421/QIC9.11-12

    2008

    • Fehr, S., & Schaffner, C. (2008). Randomness extraction via δ-biased masking in the presence of a quantum attacker. In Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings (pp. 465-481). (Lecture Notes in Computer Science; Vol. 4948). Springer. https://doi.org/10.1007/978-3-540-78524-8_26

    2007

    • Damgård, I. B., Fehr, S., Renner, R., Salvail, L., & Schaffner, C. (2007). A tight high-order entropie quantum uncertainty relation with applications. In Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings (pp. 360-378). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4622 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_20

    2006

    • Damgård, I. B., Fehr, S., Salvail, L., & Schaffner, C. (2006). Oblivious transfer and linear functions. In Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings (pp. 427-444). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4117 LNCS). Springer Verlag. https://doi.org/10.1007/11818175_26

    2005

    • Damgård, I. B., Fehr, S., Salvail, L., & Schaffner, C. (2005). Cryptography in the bounded quantum-storage model. In IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005 (pp. 24-27). IEEE. https://doi.org/10.1109/ITWTPI.2005.1543950

    2016

    • Sandberg, J., Belleman, R., Bredeweg, B., Visser, A., Endriss, U., Roelofsen, F., Schaffner, C., van Schoot, T., Sluijter, B., & et al. (2016). Eindrapport VC3BI commissie. UvA, FNWI.

    Lidmaatschap

    • Schaffner, C. (2016-). PC member, TQC 2016, Berlin.
    • Schaffner, C. (2015-). PC member, 10th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2015).

    Mediaoptreden

    Tijdschriftredactie

    • Schaffner, C. (editor) (2020). Information-Theoretic Cryptography (Event).
    • Schaffner, C. (editor) (2018). Quantum Science and Technology (Journal).
    • Schaffner, C. (editor) (2018-2028). Quantum Science and Technology (Journal).
    • Schaffner, C. (editor) (2018). Quantum Science and Technology (Journal).

    Spreker

    • Schaffner, C. (speaker) (17-3-2020). Secure Multi-Party Quantum Computation with a Dishonest Majority, The Quantum Wave in Computing, Berkeley.
    • Schaffner, C. (speaker) (3-4-2019). Landing Festival Berlin, Landing Festival, Berlin.
    • Schaffner, C. (speaker) (13-1-2018). Tutorial on Quantum Cryptography Beyond Key Distribution, Quantum Information Processing 2018, Delft.
    • Schaffner, C. (speaker) (2018). Towards obfuscation using quantum homomorphic encryption, Workshop on cryptography in the quantum age.
    • Schaffner, C. (speaker) (2018). Invited Tutorial, QCALL Secure Quantum Communications (SQC) School.

    Andere

    • Schaffner, C. (organiser) & Fehr, S. (organiser) (10-8-2020 - 14-8-2020). QCrypt 2020, Amsterdam (organising a conference, workshop, ...).
    • Schaffner, C. (visiting researcher) (10-12-2019 - 15-6-2020). Simons Institute for the Theory of Computing (visiting an external institution).

    2021

    • Dulek, Y. M. (2021). Delegated and distributed quantum computation. Institute for Logic, Language and Computation. [details]
    This list of publications is extracted from the UvA-Current Research Information System. Questions? Ask the library or the Pure staff of your faculty / institute. Log in to Pure to edit your publications. Log in to Personal Page Publication Selection tool to manage the visibility of your publications on this list.
  • Nevenwerkzaamheden
    • Geen nevenwerkzaamheden