Quantum cryptography
From MaRDI portal
Publication:5363844
DOI10.1103/REVMODPHYS.74.145zbMath1371.81006arXivquant-ph/0101098OpenAlexW3038067977WikidataQ56687878 ScholiaQ56687878MaRDI QIDQ5363844
Wolfgang Tittel, Nicolas Gisin, Grégoire Ribordy, Hugo Zbinden
Publication date: 1 October 2017
Published in: Reviews of Modern Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0101098
Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to quantum theory (81-02) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (only showing first 100 items - show all)
Four-state quantum key distribution exploiting maximum mutual information measurement strategy ⋮ Controlled secure direct communication with six-qubit entangled states ⋮ Entanglement concentration for arbitrary four-photon cluster state assisted with single photons ⋮ Improving continuous-variable quantum key distribution using the heralded noiseless linear amplifier with source in the middle ⋮ Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ Retrieving and routing quantum information in a quantum network ⋮ Generalized asymmetric phase-covariant quantum cloning within a nonextensive approach ⋮ Entanglement sudden death: a threat to advanced quantum key distribution? ⋮ Cryptographic encryption scheme based on metastable excited nuclei ⋮ Experimental multipartner quantum communication complexity employing just one qubit ⋮ On conclusive eavesdropping and measures of mutual information in quantum key distribution ⋮ Quantum discord of \(2^n\)-dimensional Bell-diagonal states ⋮ Efficient hyperentanglement concentration for \(N\)-particle Greenberger-Horne-Zeilinger state assisted by weak cross-Kerr nonlinearity ⋮ Collusive attacks to ``circle-type multi-party quantum key agreement protocols ⋮ Unconditionally secure quantum signatures ⋮ Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation ⋮ Revisiting quantum authentication scheme based on entanglement swapping ⋮ Enhancing robustness of multiparty quantum correlations using weak measurement ⋮ An enhanced proposal on decoy-state measurement device-independent quantum key distribution ⋮ Novel classical post-processing for quantum key distribution-based quantum private query ⋮ Upper bound on singlet fraction of two-qubit mixed entangled states ⋮ Upconversion-based receivers for quantum hacking-resistant quantum key distribution ⋮ Protecting tripartite entanglement in non-Markovian environments via quantum partially collapsing measurements ⋮ Temperature-dependent remote control of polarization and coherence intensity with sender's pure initial state ⋮ Continuous-variable quantum identity authentication based on quantum teleportation ⋮ Quantum cloning disturbed by thermal Davies environment ⋮ The number of terms in the superpositions upper bounds the amount of the coherence change ⋮ Bounds on multipartite concurrence and tangle ⋮ Secure quantum communication using classical correlated channel ⋮ Quantum control and information processing ⋮ Quantum filtering for systems driven by fields in single photon states and superposition of coherent states using non-Markovian embeddings ⋮ Attack and improvements of fair quantum blind signature schemes ⋮ Efficient entanglement concentration for electron-spin W state with the charge detection ⋮ Multiparty quantum key agreement with single particles ⋮ Tripartite entanglement of electron spins of noninteracting electron gases ⋮ Three-particle deterministic secure and high bit-rate direct quantum communication protocol ⋮ An entanglement concentration protocol for cluster states ⋮ Generalized form of optimal teleportation witnesses ⋮ Reexamination of arbitrated quantum signature: the impossible and the possible ⋮ Efficient bidirectional quantum secure communication with two-photon entanglement ⋮ Quantumness of quantum ensembles ⋮ Cooperative quantum two-way communications via quantum teleportation based on Brown state with the partial entanglement analysis ⋮ Novel quantum virtual private network scheme for PON via quantum secure direct communication ⋮ Cryptanalysis the security of enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping ⋮ Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator ⋮ Joint remote preparation of a class of four-qubit cluster-like states with tripartite entanglements and positive operator-valued measurements ⋮ A three-qubit state entanglement concentration protocol assisted by two-qubit systems ⋮ Complete deterministic analyzer for multi-electron Greenberger-Horne-Zeilinger states assisted by double-side optical microcavities ⋮ Cryptanalysis of the quantum group signature protocols ⋮ Nonorthogonal unitaries in two-way quantum key distribution ⋮ Realization of a phase-covariant and real state qubit quantum cloning machine ⋮ Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme ⋮ Quantum correlations in non-Markovian environments ⋮ New quantum private comparison protocol using EPR pairs ⋮ Multipartite electronic entanglement purification with charge detection ⋮ Alternative scheme to generate a supersinglet state of three-level atoms ⋮ Implementing W states and an ancilla-free 1 \(\rightarrow\) M phase-covariant cloning via adiabatic evolution ⋮ Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation ⋮ Quantum anonymous voting with anonymity check ⋮ Faithful entanglement sharing for quantum communication against collective noise ⋮ A modified quantum key distribution without public announcement bases against photon-number-splitting attack ⋮ Classical-operation-based deterministic secure quantum communication ⋮ An online banking system based on quantum cryptography communication ⋮ Quantum key agreement against collective decoherence ⋮ Linear-optics-based entanglement concentration of four-photon \(\chi\)-type states for quantum communication network ⋮ Three-party quantum network communication protocols based on quantum teleportation ⋮ The black paper of quantum cryptography: real implementation problems ⋮ Quantum key distribution using a two-way quantum channel ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Non-contextual chocolate balls versus value indefinite quantum cryptography ⋮ Optimal axis compensation in quantum key distribution protocols over unital channels ⋮ Quantum simultaneous secret distribution with dense coding by using cluster states ⋮ Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol ⋮ Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations ⋮ Protecting sing-photon multi-mode W state from photon loss ⋮ Two-party quantum key agreement with four-qubit cluster states ⋮ Efficient entanglement concentration for arbitrary less-entangled \(N\)-atom GHZ state ⋮ Controlled secret sharing protocol using a quantum cloning circuit ⋮ Extracting remaining information from an inconclusive result in optimal unambiguous state discrimination ⋮ Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique ⋮ Propagation of nonclassical correlations through one-dimensional quantum networks ⋮ Three-qubit entanglement generation of quantum states dissipating into a common environment ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Quantum identity authentication based on ping-pong technique without entanglements ⋮ Scheme for deterministic secure quantum communication with three-qubit GHZ state ⋮ Semiquantum key distribution without invoking the classical party's measurement capability ⋮ Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier ⋮ A novel protocol for multiparty quantum key management ⋮ Efficient entanglement concentration for partially entangled cluster states with weak cross-Kerr nonlinearity ⋮ High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding ⋮ A noise immunity controlled quantum teleportation protocol ⋮ Controlling continuous-variable quantum key distribution with entanglement in the middle using tunable linear optics cloning machines ⋮ Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom ⋮ Authenticated quantum key distribution with collective detection using single photons ⋮ Implementing of quantum cloning with spatially separated quantum dot spins ⋮ Efficient controlled quantum secure direct communication protocols ⋮ Teleportation protocol of three-qubit state using four-qubit quantum channels ⋮ Cryptanalysis and improvement for the quantum private comparison protocol based on triplet entangled state and single-particle measurement ⋮ Side channel passive quantum key distribution with one uninformative state ⋮ Parity proofs of the Bell-Kochen-Specker theorem based on the 600-cell
Cites Work
This page was built for publication: Quantum cryptography