Efficient quantum key distribution scheme and a proof of its unconditional security

From MaRDI portal
Revision as of 11:06, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:814839

DOI10.1007/S00145-004-0142-YzbMath1084.68047arXivquant-ph/0011056OpenAlexW2018263239MaRDI QIDQ814839

N. E. Zubov

Publication date: 8 February 2006

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0011056




Related Items (66)

Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modesThe Locking-Decoding Frontier for Generic DynamicsAn efficient quantum secret sharing protocol with orthogonal product statesTwo-way unclonable encryption with a vulnerable senderSecret sharing based on quantum Fourier transformQuantum private comparison protocol with linear opticsSignificance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocolsSemi-quantum cryptographyThe performance of three-intensity decoy-state measurement-device-independent quantum key distributionMeasure-resend authenticated semi-quantum key distribution with single photonsPerformance improvement of unidimensional continuous-variable quantum key distribution using zero-photon quantum catalysisA game-theoretic security framework for quantum cryptography: performance analysis and applicationQuantum mutual implicit authentication key agreement protocol without entanglement with key recyclingMulti-partite entanglement can speed up quantum key distribution in networksAn asymmetric dynamic multiparty quantum secret sharing against active attacksQuantum Bell states-based anonymous voting with anonymity traceComment on ``Reply to comment on `Efficient high-capacity quantum secret sharing with two-photon entanglement' Fundamental finite key limits for one-way information reconciliation in quantum key distributionParameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuationsAn improved proposal on the practical quantum key distribution with biased basisPolarization and orbital angular momentum coupling for high-dimensional measurement-device-independent quantum key distribution protocolEfficient high-capacity quantum secret sharing with two-photon entanglementSECURITY OF QUANTUM KEY DISTRIBUTIONQuantum key distribution using a two-way quantum channelKey-leakage evaluation of authentication in quantum key distribution with finite resourcesA monogamy-of-entanglement game with applications to device-independent quantum cryptographyPractical aspects of measurement-device-independent quantum key distributionQUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRSMemory-assisted measurement-device-independent quantum key distributionMultiparty semiquantum key agreement without entanglementDiscrete-phase-randomized coherent state source and its application in quantum key distributionSecure quantum network coding based on quantum homomorphic message authenticationQuantum secure direct communication network with Einstein-Podolsky-Rosen pairsNew quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ statesThreshold proxy quantum signature scheme with threshold shared verificationQUANTUM KEY EVOLUTION AND ITS APPLICATIONSQuantum Key DistributionSecurity of BB84 with weak randomness and imperfect qubit encodingQuantum homomorphic signature based on Bell-state measurementNEW QUANTUM PRIVATE COMPARISON PROTOCOL WITHOUT ENTANGLEMENTSecurity of a single-state semi-quantum key distribution protocolDecoherence can help quantum cryptographic securitySecurity proof for round-robin differential phase shift QKDQuantum key distribution with quantum walksDecoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent sourceComposable security against collective attacks of a modified BB84 QKD protocol with information only in one basisQuantum cryptographyMultiparty quantum secret splitting and quantum state sharingFinite-key analysis of high-dimensional time-energy entanglement-based quantum key distributionPassive Decoy State Quantum Key DistributionINFEASIBILITY OF QUANTUM CRYPTOGRAPHY WITHOUT EAVESDROPPING CHECKGeneralized multiparty quantum single-qutrit-state sharingFAULT-TOLERATE QUANTUM KEY DISTRIBUTION OVER A COLLECTIVE-NOISE CHANNELERROR-REJECTING BENNETT–BRASSARD–MERMIN QUANTUM KEY DISTRIBUTION PROTOCOL BASED ON LINEAR OPTICS OVER A COLLECTIVE-NOISE CHANNELA GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOLDOUBLING THE CAPACITY OF QUANTUM KEY DISTRIBUTION BY USING BOTH POLARIZATION AND DIFFERENTIAL PHASE SHIFTSTABLE AND DETERMINISTIC QUANTUM KEY DISTRIBUTION BASED ON DIFFERENTIAL PHASE SHIFTThe locking-decoding frontier for generic dynamicsImproving the secure key rate and error tolerance of the interferometer-based time-frequency encoding QKD systemSifting attacks in finite-size quantum key distributionFinite-key security analysis for multilevel quantum key distributionAnalysis of polarization coding for subcarrier multiplexing quantum key distributionUniversal construction of a full quantum one-way functionToward secure communication using intra-particle entanglementHigher-rate quantum key expansion schemeEfficient semiquantum key distribution without entanglement







This page was built for publication: Efficient quantum key distribution scheme and a proof of its unconditional security