Decoherence can help quantum cryptographic security
From MaRDI portal
Publication:1993860
DOI10.1007/s11128-018-1974-yzbMath1448.81292arXiv1712.06519OpenAlexW3106222493MaRDI QIDQ1993860
Publication date: 5 November 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1712.06519
Open systems, reduced dynamics, master equations, decoherence (81S22) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Quantum channels, fidelity (81P47)
Related Items
Entropy analysis of the discrete-time quantum walk under bit-flip noise channel ⋮ Significance of controller independent Bell state-based communication protocol ⋮ Ping-pong quantum key distribution with trusted noise: non-Markovian advantage ⋮ Hierarchy of quantum correlations under non-Markovian dynamics ⋮ Analysis of atmospheric effects on satellite-based quantum communication: a comparative study ⋮ Distinguishing environment-induced non-Markovianity from subsystem dynamics
Cites Work
- Unnamed Item
- Unnamed Item
- A general scheme for information interception in the ping-pong protocol
- Quantum cryptography: public key distribution and coin tossing
- Dissipative and non-dissipative single-qubit channels: dynamics and geometry
- A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
- Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits
- On the security of the ping-pong protocol
- An environment-mediated quantum deleter
- Controlled bidirectional remote state preparation in noisy environment: a generalized view
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Secure direct communication based on ping-pong protocol
- Improving security of the ping-pong protocol
- Security of ping-pong protocol based on pairs of completely entangled qudits
- Quantum private set intersection cardinality and its application to anonymous authentication
- Toward secure communication using intra-particle entanglement
- Improving Wójcik's eavesdropping attack on the ping-pong protocol
- BEYOND THE GOLDENBERG–VAIDMAN PROTOCOL: SECURE AND EFFICIENT QUANTUM COMMUNICATION USING ARBITRARY, ORTHOGONAL, MULTI-PARTICLE QUANTUM STATES
- THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION
- Quantum Computation and Quantum Information
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum Cryptography Based on Orthogonal States
- A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure
- Quantum Cryptography: Key Distribution and Beyond
- Quantum cryptography
- Dynamics of decoherence without dissipation in a squeezed thermal bath