Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
From MaRDI portal
Publication:5137709
DOI10.1088/1367-2630/14/9/093014zbMath1448.81283arXiv1107.0589OpenAlexW3101078304MaRDI QIDQ5137709
Toyohiro Tsurumaru, Masahito Hayashi
Publication date: 2 December 2020
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1107.0589
Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94) Computational stability and error-correcting codes for quantum computation and communication processing (81P73) LOCC, teleportation, dense coding, remote state operations, distillation (81P48)
Related Items (7)
Fundamental finite key limits for one-way information reconciliation in quantum key distribution ⋮ Quantum cryptography beyond quantum key distribution ⋮ Finite-key security analysis of quantum key distribution with imperfect light sources ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ Sifting attacks in finite-size quantum key distribution ⋮ Finite-key security analysis for multilevel quantum key distribution ⋮ Multi-partite squash operation and its application to device-independent quantum key distribution
Cites Work
- Unnamed Item
- Unnamed Item
- The tail of the hypergeometric distribution
- Almost independence of random variables and capacity of a secrecy channel
- A course in error-correcting codes.
- Normal approximation to the hypergeometric distribution in nonstandard cases and a sub-Gaussian Berry-Esseen theorem
- Secure key rate of the BB84 protocol using finite sample bits
- Unconditional security in quantum cryptography
- NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION
- The Wire-Tap Channel
- Broadcast channels with confidential messages
- A Pseudorandom Generator from any One-way Function
- Generalized privacy amplification
- Information Spectrum Approach to Second-Order Coding Rate in Channel Coding
- Channel Coding Rate in the Finite Blocklength Regime
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths