Quantum cryptography: public key distribution and coin tossing

From MaRDI portal
Revision as of 04:50, 30 January 2024 by Import240129110155 (talk | contribs) (Created automatically from import240129110155)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:477162

DOI10.1016/J.TCS.2014.05.025zbMath1306.81030arXiv2003.06557OpenAlexW2015179126WikidataQ29011667 ScholiaQ29011667MaRDI QIDQ477162

Gilles Brassard, Charles H. Bennett

Publication date: 2 December 2014

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/2003.06557




Related Items (only showing first 100 items - show all)

High-dimensional deterministic multiparty quantum secret sharing without unitary operationsQuantum authenticated direct communication using Bell statesA quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger statesQuantum private communication with an anonymous senderImproving key rate of optical fiber quantum key distribution system based on channel tomographyImproved secure multiparty computation with a dishonest majority via quantum meansQuantum secure direct communication based on four-Qubit cluster statesPerspectives on entangled nuclear particle pairs generation and manipulation in quantum communication and cryptography systemsComment on ``High-dimensional deterministic multiparty quantum secret sharing without unitary operationsComment on quantum private comparison protocols with a semi-honest third partyEfficient quantum private comparison employing single photons and collective detectionBipartite coherent-state quantum key distribution with strong reference pulseMulti-party quantum key agreement with Bell states and Bell measurementsMulti-user private comparison protocol using GHZ class statesTight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglementCryptanalysis of a new circular quantum secret sharing protocol for remote agentsHolographic quantum tasks with input and output regionsMulti-party traveling-mode quantum key agreement protocols immune to collusive attackCryptanalysis of secret sharing with a single \(d\)-level quantum systemKak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocolNew scheme for measurement-device-independent quantum key distributionTunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden codingTwo authenticated quantum dialogue protocols based on three-particle entangled statesSecure multi-party quantum summation based on quantum Fourier transformSecurity of a single-state semi-quantum key distribution protocolTwo-party quantum key agreement protocols under collective noise channelEstablishing rational networking using the DL04 quantum secure direct communication protocolControlled mutual quantum entity authentication with an untrusted third partyQuantum conferenceA large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglementSelf-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavitiesImplementation of a hybrid scheme for coherent plug-and-play quantum key distributionRational protocol of quantum secure multi-party computationDecoherence can help quantum cryptographic securityQuantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic mapImproved statistical fluctuation analysis for measurement-device-independent quantum key distributionEverlasting multi-party computationSecurity proof for round-robin differential phase shift QKDMulti-party quantum private comparison of size relation with \(d\)-level single-particle statesMonitoring the intercept-resend attack with the weak measurement modelThe effect of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocolsQuantum key distribution with quantum walksComment on ``A novel quantum deniable authentication protocol without entanglementX states of the same spectrum and entanglement as all two-qubit statesDecoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent sourceConstruction of quantum gates for concatenated Greenberger-Horne-Zeilinger-type logic qubitQuantum games: a review of the history, current state, and interpretationA new multi-party quantum private comparison protocol based on circle modelSemi-quantum bi-signature scheme based on W statesQuantum privacy-preserving price E-negotiationAnnular controlled teleportationNew public-key quantum signature scheme with quantum one-way functionAn axiomatization for quantum processes to unifying quantum and classical computingQuantum anonymous voting protocol with the privacy protection of the candidateProbabilistic process algebra to unifying quantum and classical computing in closed systemsMultiparty semi-quantum secret sharing with \(d\)-level single-particle statesA novel pure entangled state based two-party quantum private comparison protocolSemi-quantum key agreement and private comparison protocols using Bell statesAn efficient quantum sealed bidding auction scheme based on the correlation of genuine five-qubit entangled stateImproved entanglement-purification protocol using three Werner states and LOCCProtecting single-photon entanglement with imperfect single-photon sourceTrojan-horse attacks on quantum key distribution with classical bobA hybrid quantum key distribution protocol based on extended unitary operations and fountain codesEfficient controlled quantum secure direct communication based on GHZ-like statesControlled probabilistic quantum key distribution using a ground statePrivate database queries using one quantum stateQuantum private information retrieval has linear communication complexityA quantum dialogue protocol in discrete-time quantum walk based on hyperentangled statesGeometric Rényi divergence and its applications in quantum channel capacitiesSchmidt rank constraints in quantum information theoryEfficient simulation of random states and random unitariesOblivious transfer is in MiniQCryptQuantum secure multi-party summation based on Grover's search algorithmEfficient quantum private comparison based on entanglement swapping of Bell statesQuantum dialogue protocol based on Bell entangled states and single photonsQuantum secure direct communication with mutual authentication using a single basisMulti-party quantum key agreement protocol with authenticationA lightweight semi-quantum E-payment protocol based on blockchainNew constructions for quantum money and its applicationDynamic multi-party quantum key agreement protocol based on commutative encryptionLeakage-resilient key exchange and two-seed extractorsDual bounds for the positive definite functions approach to mutually unbiased basesCombining quantum key distribution with chaotic systems for free-space optical communicationsNecessary conditions on effective quantum entanglement catalystsAn efficient semi-quantum private comparison without pre-shared keysImproved and practical proposal for measurement device independent quantum dialogueQuantum teleportation of a \(N\)-qubit entangled state by using a \((N+1)\)-qubit cluster stateConstruction of a family of positive but not completely positive map for the detection of bound entangled statesSemi-device-independent quantum key agreement protocolA cost-effective quantum protocol for secure multi-party multiplicationCluster-state-based quantum secret sharing for users with different abilitiesVerifiable user quantum session key agreement protocol for smart home environmentSecure two-party integer comparison protocol without any third partyQuantum identity authentication in the orthogonal-state-encoding QKD systemControlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemesEfficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell stateZero transfer in continuous-time quantum walksQuantum protocols for secure multi-party summationError correction in quantum cryptography based on artificial neural networksCreating photonic GHZ and W states via quantum walk




Cites Work




This page was built for publication: Quantum cryptography: public key distribution and coin tossing