Quantum cryptography without public announcement of bases
From MaRDI portal
Publication:1390751
DOI10.1016/S0375-9601(98)00358-2zbMath0972.94027arXivquant-ph/9702009OpenAlexW3126033603MaRDI QIDQ1390751
Publication date: 15 July 1998
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/9702009
Related Items (20)
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ An efficient quantum secret sharing protocol with orthogonal product states ⋮ Significance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocols ⋮ An improved QKD protocol without public announcement basis using periodically derived basis ⋮ Efficient quantum private communication based on dynamic control code sequence ⋮ A modified quantum key distribution without public announcement bases against photon-number-splitting attack ⋮ Many-agent controlled teleportation of multi-qubit quantum information ⋮ Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss ⋮ QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS ⋮ QUANTUM SECURE DIRECT COMMUNICATION WITH A CONSTANT NUMBER OF EPR PAIRS ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ AN EFFICIENT MULTIPARTY QUANTUM KEY DISTRIBUTION SCHEME ⋮ Improving Wójcik's eavesdropping attack on the ping-pong protocol ⋮ Threshold proxy quantum signature scheme with threshold shared verification ⋮ QUANTUM KEY EVOLUTION AND ITS APPLICATIONS ⋮ Bidirectional quantum secret sharing and secret splitting with polarized single photons ⋮ AN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSION ⋮ Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks ⋮ Higher-rate quantum key expansion scheme ⋮ Partition a quantum pure-state set into unambiguously discriminable subsets
Cites Work
- Quantum cloning, eavesdropping and Bell's inequality
- Coherent eavesdropping strategies for the four state quantum cryptography protocol.
- Privacy Amplification by Public Discussion
- Quantum cryptography without Bell’s theorem
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Quantum cryptography without public announcement of bases