Proof of security of quantum key distribution with two-way classical communications

From MaRDI portal
Revision as of 18:21, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4679922

DOI10.1109/TIT.2002.807289zbMath1063.94081arXivquant-ph/0105121OpenAlexW2165923712MaRDI QIDQ4679922

Hoi-Kwong Lo

Publication date: 31 May 2005

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0105121




Related Items (35)

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approachThe Locking-Decoding Frontier for Generic DynamicsNOTES ON THE FIDELITY OF SYMPLECTIC QUANTUM ERROR-CORRECTING CODESIndistinguishability of pure orthogonal product states by LOCCQuantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedomHopf cyclic cohomology and Chern character of equivariant \(K\)-theoriesOne-time pads cannot be used to improve the efficiency of quantum communicationDe Finetti theorems for quantum conditional probability distributions with symmetryImproving the security of protocols of quantum key agreement solely using Bell states and Bell measurementFrequency shift attack on ‘plug-and-play’ quantum key distribution systemsQuantum Bell states-based anonymous voting with anonymity traceOperator structures and quantum one-way LOCC conditionsSECURITY OF QUANTUM KEY DISTRIBUTIONSECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOLCryptanalysis and improvement of multiparty quantum secret sharing schemesEverything you always wanted to know about LOCC (but were afraid to ask)Optimal axis compensation in quantum key distribution protocols over unital channelsTwo-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofsRole of Bell-CHSH violation and local filtering in quantum key distributionQuantum private comparison over noisy channelsSymmetric extendibility for qudits and tolerable error rates in quantum cryptographyA novel quantum dragonfly multi-key exchange protocol beyond conventional attacksMonitoring the intercept-resend attack with the weak measurement modelTHE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTAn efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairsPractical entanglement distillation scheme using recurrence method and quantum low density parity check codesONE-PARTY QUANTUM-ERROR-CORRECTING CODES FOR UNBALANCED ERRORS: PRINCIPLES AND APPLICATION TO QUANTUM DENSE CODING AND QUANTUM SECURE DIRECT COMMUNICATIONQuantum cryptographyControlled probabilistic quantum key distribution using a ground stateQuantum entanglementVerification of Quantum Protocols with a Probabilistic Model-CheckerThe locking-decoding frontier for generic dynamicsSecurity Bounds for Quantum Cryptography with Finite ResourcesNOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATIONIndividual attacks with generalized discrimination and inadequacy of some information measures






This page was built for publication: Proof of security of quantum key distribution with two-way classical communications