Quantum cryptography: public key distribution and coin tossing
From MaRDI portal
Publication:477162
DOI10.1016/J.TCS.2014.05.025zbMath1306.81030arXiv2003.06557OpenAlexW2015179126WikidataQ29011667 ScholiaQ29011667MaRDI QIDQ477162
Gilles Brassard, Charles H. Bennett
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2003.06557
Related Items (only showing first 100 items - show all)
High-dimensional deterministic multiparty quantum secret sharing without unitary operations ⋮ Quantum authenticated direct communication using Bell states ⋮ A quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger states ⋮ Quantum private communication with an anonymous sender ⋮ Improving key rate of optical fiber quantum key distribution system based on channel tomography ⋮ Improved secure multiparty computation with a dishonest majority via quantum means ⋮ Quantum secure direct communication based on four-Qubit cluster states ⋮ Perspectives on entangled nuclear particle pairs generation and manipulation in quantum communication and cryptography systems ⋮ Comment on ``High-dimensional deterministic multiparty quantum secret sharing without unitary operations ⋮ Comment on quantum private comparison protocols with a semi-honest third party ⋮ Efficient quantum private comparison employing single photons and collective detection ⋮ Bipartite coherent-state quantum key distribution with strong reference pulse ⋮ Multi-party quantum key agreement with Bell states and Bell measurements ⋮ Multi-user private comparison protocol using GHZ class states ⋮ Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement ⋮ Cryptanalysis of a new circular quantum secret sharing protocol for remote agents ⋮ Holographic quantum tasks with input and output regions ⋮ Multi-party traveling-mode quantum key agreement protocols immune to collusive attack ⋮ Cryptanalysis of secret sharing with a single \(d\)-level quantum system ⋮ Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol ⋮ New scheme for measurement-device-independent quantum key distribution ⋮ Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding ⋮ Two authenticated quantum dialogue protocols based on three-particle entangled states ⋮ Secure multi-party quantum summation based on quantum Fourier transform ⋮ Security of a single-state semi-quantum key distribution protocol ⋮ Two-party quantum key agreement protocols under collective noise channel ⋮ Establishing rational networking using the DL04 quantum secure direct communication protocol ⋮ Controlled mutual quantum entity authentication with an untrusted third party ⋮ Quantum conference ⋮ A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement ⋮ Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities ⋮ Implementation of a hybrid scheme for coherent plug-and-play quantum key distribution ⋮ Rational protocol of quantum secure multi-party computation ⋮ Decoherence can help quantum cryptographic security ⋮ Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map ⋮ Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution ⋮ Everlasting multi-party computation ⋮ Security proof for round-robin differential phase shift QKD ⋮ Multi-party quantum private comparison of size relation with \(d\)-level single-particle states ⋮ Monitoring the intercept-resend attack with the weak measurement model ⋮ The effect of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocols ⋮ Quantum key distribution with quantum walks ⋮ Comment on ``A novel quantum deniable authentication protocol without entanglement ⋮ X states of the same spectrum and entanglement as all two-qubit states ⋮ Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source ⋮ Construction of quantum gates for concatenated Greenberger-Horne-Zeilinger-type logic qubit ⋮ Quantum games: a review of the history, current state, and interpretation ⋮ A new multi-party quantum private comparison protocol based on circle model ⋮ Semi-quantum bi-signature scheme based on W states ⋮ Quantum privacy-preserving price E-negotiation ⋮ Annular controlled teleportation ⋮ New public-key quantum signature scheme with quantum one-way function ⋮ An axiomatization for quantum processes to unifying quantum and classical computing ⋮ Quantum anonymous voting protocol with the privacy protection of the candidate ⋮ Probabilistic process algebra to unifying quantum and classical computing in closed systems ⋮ Multiparty semi-quantum secret sharing with \(d\)-level single-particle states ⋮ A novel pure entangled state based two-party quantum private comparison protocol ⋮ Semi-quantum key agreement and private comparison protocols using Bell states ⋮ An efficient quantum sealed bidding auction scheme based on the correlation of genuine five-qubit entangled state ⋮ Improved entanglement-purification protocol using three Werner states and LOCC ⋮ Protecting single-photon entanglement with imperfect single-photon source ⋮ Trojan-horse attacks on quantum key distribution with classical bob ⋮ A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes ⋮ Efficient controlled quantum secure direct communication based on GHZ-like states ⋮ Controlled probabilistic quantum key distribution using a ground state ⋮ Private database queries using one quantum state ⋮ Quantum private information retrieval has linear communication complexity ⋮ A quantum dialogue protocol in discrete-time quantum walk based on hyperentangled states ⋮ Geometric Rényi divergence and its applications in quantum channel capacities ⋮ Schmidt rank constraints in quantum information theory ⋮ Efficient simulation of random states and random unitaries ⋮ Oblivious transfer is in MiniQCrypt ⋮ Quantum secure multi-party summation based on Grover's search algorithm ⋮ Efficient quantum private comparison based on entanglement swapping of Bell states ⋮ Quantum dialogue protocol based on Bell entangled states and single photons ⋮ Quantum secure direct communication with mutual authentication using a single basis ⋮ Multi-party quantum key agreement protocol with authentication ⋮ A lightweight semi-quantum E-payment protocol based on blockchain ⋮ New constructions for quantum money and its application ⋮ Dynamic multi-party quantum key agreement protocol based on commutative encryption ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Dual bounds for the positive definite functions approach to mutually unbiased bases ⋮ Combining quantum key distribution with chaotic systems for free-space optical communications ⋮ Necessary conditions on effective quantum entanglement catalysts ⋮ An efficient semi-quantum private comparison without pre-shared keys ⋮ Improved and practical proposal for measurement device independent quantum dialogue ⋮ Quantum teleportation of a \(N\)-qubit entangled state by using a \((N+1)\)-qubit cluster state ⋮ Construction of a family of positive but not completely positive map for the detection of bound entangled states ⋮ Semi-device-independent quantum key agreement protocol ⋮ A cost-effective quantum protocol for secure multi-party multiplication ⋮ Cluster-state-based quantum secret sharing for users with different abilities ⋮ Verifiable user quantum session key agreement protocol for smart home environment ⋮ Secure two-party integer comparison protocol without any third party ⋮ Quantum identity authentication in the orthogonal-state-encoding QKD system ⋮ Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes ⋮ Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state ⋮ Zero transfer in continuous-time quantum walks ⋮ Quantum protocols for secure multi-party summation ⋮ Error correction in quantum cryptography based on artificial neural networks ⋮ Creating photonic GHZ and W states via quantum walk
Cites Work
This page was built for publication: Quantum cryptography: public key distribution and coin tossing