A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
DOI10.1007/s11128-014-0860-5zbMath1311.81097OpenAlexW2044448188WikidataQ58184808 ScholiaQ58184808MaRDI QIDQ2018188
Hong Lai, Josef Pieprzyk, Mehmet A. Orgun, Liyin Xue, Jinghua Xiao
Publication date: 13 April 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0860-5
authenticationeavesdropping detectionEPR pairsextended unitary operationsfountain codeskey distribution protocols
Cryptography (94A60) Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- New circular quantum secret sharing for remote agents
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
- Entanglement is Not Necessary for Perfect Discrimination between Unitary Operations
- Quantum cryptography based on Bell’s theorem
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Quantum Cryptography Based on Orthogonal States
- A single quantum cannot be cloned
This page was built for publication: A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes