Quantum cryptography without public announcement of bases

From MaRDI portal
Revision as of 15:56, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1390751

DOI10.1016/S0375-9601(98)00358-2zbMath0972.94027arXivquant-ph/9702009OpenAlexW3126033603MaRDI QIDQ1390751

D. Massart

Publication date: 15 July 1998

Published in: Physics Letters. A (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/9702009




Related Items (20)

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approachAn efficient quantum secret sharing protocol with orthogonal product statesSignificance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocolsAn improved QKD protocol without public announcement basis using periodically derived basisEfficient quantum private communication based on dynamic control code sequenceA modified quantum key distribution without public announcement bases against photon-number-splitting attackMany-agent controlled teleportation of multi-qubit quantum informationImproved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel lossQUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRSQUANTUM SECURE DIRECT COMMUNICATION WITH A CONSTANT NUMBER OF EPR PAIRSA practical protocol for three-party authenticated quantum key distributionAN EFFICIENT MULTIPARTY QUANTUM KEY DISTRIBUTION SCHEMEImproving Wójcik's eavesdropping attack on the ping-pong protocolThreshold proxy quantum signature scheme with threshold shared verificationQUANTUM KEY EVOLUTION AND ITS APPLICATIONSBidirectional quantum secret sharing and secret splitting with polarized single photonsAN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSIONEavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacksHigher-rate quantum key expansion schemePartition a quantum pure-state set into unambiguously discriminable subsets



Cites Work


This page was built for publication: Quantum cryptography without public announcement of bases