Pages that link to "Item:Q3196618"
From MaRDI portal
The following pages link to Unconditional security in quantum cryptography (Q3196618):
Displayed 50 items.
- A search for quantum coin-flipping protocols using optimization techniques (Q263220) (← links)
- A quantum multi-proxy blind signature scheme based on genuine four-qubit entangled state (Q264722) (← links)
- Measurement-device-independent quantum key distribution with q-plate (Q264875) (← links)
- A voting protocol based on the controlled quantum operation teleportation (Q299491) (← links)
- The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states (Q331434) (← links)
- The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources (Q332037) (← links)
- Measurement device-independent quantum key distribution with heralded pair coherent state (Q332128) (← links)
- A electronic voting scheme achieved by using quantum proxy signature (Q332588) (← links)
- Attack and improvements of fair quantum blind signature schemes (Q352934) (← links)
- Secret sharing based on quantum Fourier transform (Q356899) (← links)
- Novel quantum virtual private network scheme for PON via quantum secure direct communication (Q382804) (← links)
- Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator (Q382846) (← links)
- Computational indistinguishability between quantum states and its cryptographic application (Q434349) (← links)
- An online banking system based on quantum cryptography communication (Q458055) (← links)
- A quantum proxy signature scheme based on genuine five-qubit entangled state (Q458550) (← links)
- The black paper of quantum cryptography: real implementation problems (Q477167) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- A practical protocol for three-party authenticated quantum key distribution (Q488178) (← links)
- Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency (Q488204) (← links)
- Semi-automated verification of security proofs of quantum cryptographic protocols (Q491263) (← links)
- Realization of error correction and reconciliation of continuous quantum key distribution in detail (Q848323) (← links)
- A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light (Q892638) (← links)
- Efficient bit sifting scheme of post-processing in quantum key distribution (Q892640) (← links)
- Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line (Q892646) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Quantum cryptography (Q975385) (← links)
- Splitting information securely with entanglement (Q1887141) (← links)
- A new protocol and lower bounds for quantum coin flipping (Q1887717) (← links)
- Quantum proxy multi-signature scheme using genuinely entangled six qubits state (Q1955885) (← links)
- Controlled probabilistic quantum key distribution using a ground state (Q2018220) (← links)
- An arbitrated quantum signature protocol based on the chained CNOT operations encryption (Q2355620) (← links)
- On the existence of quantum signature for quantum messages (Q2436471) (← links)
- A quantum proxy weak blind signature scheme (Q2444053) (← links)
- Equational Reasoning About Quantum Protocols (Q2822505) (← links)
- Classical Knowledge for Quantum Cryptographic Reasoning (Q2864501) (← links)
- Semiquantum key distribution (Q2901572) (← links)
- QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES (Q3015431) (← links)
- Remote preparation of arbitrary ensembles and quantum bit commitment (Q3024158) (← links)
- Quantum entanglement (Q3077043) (← links)
- Quantum Key Distribution with Classical Bob (Q3107745) (← links)
- Unconditional security in quantum cryptography (Q3196618) (← links)
- NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION (Q3427049) (← links)
- AN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSION (Q3427051) (← links)
- Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money (Q3455197) (← links)
- CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM (Q3509797) (← links)
- SECURITY OF QUANTUM KEY DISTRIBUTION (Q3525381) (← links)
- SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL (Q3528844) (← links)
- REALIZABLE QUANTUM BROADCASTING MULTI-SIGNATURE SCHEME (Q3611552) (← links)
- Trading quantum for classical resources in quantum data compression (Q4832733) (← links)
- Symmetric extendibility for qudits and tolerable error rates in quantum cryptography (Q4903092) (← links)