Quantum Cryptography: Key Distribution and Beyond (Q5134949): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: McEliece / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3099819669 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1802.05517 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4847941 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using quantum key distribution for cryptographic purposes: a survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography: public key distribution and coin tossing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography based on Bell’s theorem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monogamy of non-local quantum correlations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The black paper of quantum cryptography: real implementation problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography using any two nonorthogonal states / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Cryptography Based on Orthogonal States / rank
 
Normal rank
Property / cites work
 
Property / cites work: BEYOND THE GOLDENBERG–VAIDMAN PROTOCOL: SECURE AND EFFICIENT QUANTUM COMMUNICATION USING ARBITRARY, ORTHOGONAL, MULTI-PARTICLE QUANTUM STATES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocols of quantum key agreement solely using Bell states and Bell measurement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Experimental quantum teleportation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Broadcast channels with confidential messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Key Distribution and String Oblivious Transfer in Noisy Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditional security in quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mixed-state entanglement and quantum error correction / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of the security of quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Computation and Quantum Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: A three-stage quantum cryptography protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Key Distribution with Classical Bob / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semiquantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proposed Experiment to Test Local Hidden-Variable Theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticated semi-quantum direct communication protocols using Bell states / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-quantum information splitting using GHZ-type states / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum secret sharing with classical Bobs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semiquantum key distribution without invoking the classical party's measurement capability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of a semi-quantum protocol where reflections contribute to the secret key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Bounds for Quantum Cryptography with Finite Resources / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Quantum Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: An integrated hierarchical dynamic quantum secret sharing protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Composing Quantum Protocols in a Classical Environment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography over non-Markovian channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2843433 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymmetric quantum dialogue in noisy environment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum dialogue / rank
 
Normal rank
Property / cites work
 
Property / cites work: An inter-bank e-payment protocol based on quantum proxy blind signature / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum English auctions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum algorithms and the Fourier transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counterfactual computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counterfactual Quantum Deterministic Key Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Comment on ‘Two-state vector formalism and quantum interference’ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counterfactuality of ‘counterfactual’ communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4709697 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522483 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full Security of Quantum Key Distribution From No-Signaling Constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Device-Independent Quantum Key Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi device independence of the BB84 protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of practical time-reversed EPR quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Steering, Entanglement, Nonlocality, and the Einstein-Podolsky-Rosen Paradox / rank
 
Normal rank
Property / cites work
 
Property / cites work: Testing the Dimension of Hilbert Spaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the origin of nonclassicality in single systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Bell’s Theorem to Secure Quantum Key Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extracting randomness: A survey and new constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical quantum communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Coin flipping by telephone a protocol for solving impossible problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A short impossibility proof of quantum bit commitment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Bit Commitment with a Composite Evidence / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum key distribution based on orthogonal states allows secure quantum bit commitment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum bit escrow / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new protocol and lower bounds for quantum coin flipping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Quantum Strong Coin Flipping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Bounds for Classical and Quantum Coin Flipping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weak Coin Flipping in a Device-Independent Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private information retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Private Queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Private Queries: Security Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum private information retrieval has linear communication complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private database queries using one quantum state / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient quantum scheme for private set intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic relativistic quantum bit commitment / rank
 
Normal rank
Property / cites work
 
Property / cites work: A no-summoning theorem in relativistic quantum theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Summoning information in spacetime, or where and when can a qubit be? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum key distribution using multilevel encoding: security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3392637 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Driving the Bloch vector of a single molecule: towards a triggered single photon source / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Long Distance Quantum Key Distribution with Continuous Variables / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributing secret keys with quantum continuous variables: principle, security and implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Why haven't more quantum algorithms been found? / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Decade of Lattice Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing Key Length of the McEliece Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking and Defending the McEliece Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Cryptanalysis of SFLASH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343439 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Introduction to post-quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient post-quantum undeniable signature on 64-bit ARM / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Note on Quantum Security for Post-Quantum Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Characterizing quantum theory in terms of information-theoretic constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522519 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522520 / rank
 
Normal rank

Latest revision as of 02:14, 24 July 2024

scientific article; zbMATH DE number 7275195
Language Label Description Also known as
English
Quantum Cryptography: Key Distribution and Beyond
scientific article; zbMATH DE number 7275195

    Statements

    Quantum Cryptography: Key Distribution and Beyond (English)
    0 references
    0 references
    0 references
    0 references
    18 November 2020
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references