Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michel Boyer is active.

Publication


Featured researches published by Michel Boyer.


Journal of Cryptology | 2006

A Proof of the Security of Quantum Key Distribution

Eli Biham; Michel Boyer; P. Oscar Boykin; Tal Mor; Vwani P. Roychowdhury

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.


Physical Review Letters | 2007

Quantum Key Distribution with Classical Bob

Michel Boyer; Dan Kenigsberg; Tal Mor

Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob) has only classical capabilities? We present two protocols with this constraint, and prove their robustness against attacks: we prove that any attempt of an adversary to obtain information (and even a tiny amount of information) necessarily induces some errors that the legitimate users could notice.


Physical Review A | 2009

Semiquantum key distribution

Michel Boyer; Ran Gelles; Dan Kenigsberg; Tal Mor

Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob) has only classical capabilities? Recently, a semi-quantum key distribution protocol was presented (Boyer, Kenigsberg and Mor, Physical Review Letters, 2007), in which one of the parties (Bob) is classical, and yet, the protocol is proven to be completely robust against an eavesdropping attempt. Here we extend that result much further. We present two protocols with this constraint, and prove their robustness against attacks: we prove that any attempt of an adversary to obtain information (and even a tiny amount of information) necessarily induces some errors that the legitimate parties could notice. One protocol presented here is identical to the one referred to above, however, its robustness is proven here in a much more general scenario. The other protocol is very different as it is based on randomization.


Algorithmica | 2002

Security of Quantum Key Distribution Against All Collective Attacks

Eli Biham; Michel Boyer; Gilles Brassard; Jeroen van de Graaf; Tal Mor

Abstract. Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key. This work was crucial for a full proof of security (against the joint attack) recently obtained by Biham, Boyer, Boykin, Mor, and Roychowdhury [1].


PLILP '90 Proceedings of the 2nd International Workshop on Programming Language Implementation and Logic Programming | 1990

Elementary Logic Programs

Paul Tarau; Michel Boyer

We introduce a variant of binary programs called elementary programs, based on a set of algebraic operations on a lattice of expressions. We propose a version of SLD-resolution that evaluates elementary programs by a unique operation of arrow composition and we study its OR-parallel implementation.


ACM Transactions on Design Automation of Electronic Systems | 2001

Optimal design of synchronous circuits using software pipelining techniques

François R. Boyer; El Mostapha Aboulhamid; Yvon Savaria; Michel Boyer

We present a method to optimize clocked circuits by relocating and changing the time of activation of registers to maximize the throughput. Our method is based on a modulo scheduling algorithm for software pipelining, instead of retiming. It optimizes the circuit without the constraint on the clock phases that retiming has, which permits to always achieve the optimal clock period. The two methods have the same overall time complexity, but we avoid the computation of all pair-shortest paths, which is a heavy burden regarding both space and time. From the optimal schedule found, registers are placed in the circuit without looking at where the original registers were. The resulting circuit is a multi-phase clocked circuit, where all the clocks have the same period and the phases are automatically determined by the algorithm. Edge-triggered flip-flops are used where the combinational delays exactly match that period, whereas level-sensitive latches are used elsewhere, improving the area occupied by the circuit. Experiments on existing and newly developed benchmarks show a substantial performance improvement compared to previously published work.


computational intelligence | 1985

Generating paraphrases from meaning-text semantic networks

Michel Boyer; Guy Lapalme

This paper describes a first attempt to base a paraphrase generation system upon Meľčuk and Žolkovskijs linguistic meaning‐text (MT) model whose purpose is to establish correspondences between meanings, represented by networks, and (ideally) all synonymous texts having this meaning. The system described here contains a Prolog implementation of a small explanatory and combinatorial dictionary (the MT lexicon) and, using unification and backtracking, generates from a given network the sentences allowed by the dictionary and the lexical transformations of the model. The passage from a net to the final texts is done through a series of transformations of intermediary structures that closely correspond to MT utterance representations (semantic, deep‐syntax, surface‐syntax, and morphological representations). These are graphs and trees with labeled arcs. The Prolog unification (equality predicate) was extended to extract information from these representations and build new ones. The notion of utterance path, used by many authors, is replaced by that of covering by defining subnetworks.


Journal of Automated Reasoning | 1999

Reasoning about Solids Using Constraint Logic Programming

Gilles Pesant; Michel Boyer

The embedding of constraint satisfaction on the domain of discourse into a rule-based programming paradigm like logic programming provides a powerful reasoning tool. We present an application in spatial reasoning that uses this combination to produce a clear, concise, yet very expressive system through its ability to manipulate partial information. Three-dimensional solid objects in constructive solid geometry representation are manipulated, and their spatial relationship with one another, points, or regions is reasoned about. The language used to develop this application is QUAD-CLP(ℜ), an experimental constraint logic programming language of our own design, which is equipped with a solver for quadratic and linear arithmetic constraints over the reals.


Physical Review A | 2017

Entanglement and deterministic quantum computing with one qubit

Michel Boyer; Aharon Brodutch; Tal Mor

The role of entanglement and quantum correlations in complex physical systems and quantum information processing devices has become a topic of intense study in the past two decades. In this work we present new tools for learning about entanglement and quantum correlations in dynamical systems where the quantum states are mixed and the eigenvalue spectrum is highly degenerate. We apply these results to the Deterministic quantum computing with one qubit (DQC1) computation model and show that the states generated in a DQC1 circuit have an eigenvalue structure that makes them difficult to entangle, even when they are relatively far from the completely mixed state. Our results strengthen the conjecture that it may be possible to find quantum algorithms that do not generate entanglement and yet still have an exponential advantage over their classical counterparts.


theoretical aspects of software engineering | 2011

Undesirable Aspect Interactions: A Prevention Policy

Arsène Sabas; Subash Shankar; Virginie Wiels; Michel Boyer

Aspect-oriented software development (AOSD) has emerged in recent years as a new paradigm for software development, providing mechanisms to localize cross-cutting concerns (i.e. scattered in many locations) during the software development process. Aspect interaction problems (due to their integration into the base components) is an important issue in AOSD, verification is most often based on a detection and correction strategy. This paper presents an ongoing work which goal is to built a prevention mechanism at the specification phase for aspect-oriented systems. This prevention mechanism will allow to avoid undesirable interactions in a aspect-oriented system. By acting at the specification phase, we believe that verification will be made timeless and costless.

Collaboration


Dive into the Michel Boyer's collaboration.

Top Co-Authors

Avatar

Tal Mor

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rotem Liss

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Arsène Sabas

Université de Montréal

View shared research outputs
Top Co-Authors

Avatar

Dan Kenigsberg

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eli Biham

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Paul Tarau

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

Subash Shankar

City University of New York

View shared research outputs
Top Co-Authors

Avatar

Guy Lapalme

Université de Montréal

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge