A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
DOI10.1007/S11128-014-0860-5zbMATH Open1311.81097OpenAlexW2044448188WikidataQ58184808 ScholiaQ58184808MaRDI QIDQ2018188FDOQ2018188
Hong Lai, Josef Pieprzyk, Mehmet A. Orgun, Liyin Xue, Jinghua Xiao
Publication date: 13 April 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0860-5
Recommendations
- Unconditional security of a \(K\)-state quantum key distribution protocol
- Quantum deterministic key distribution protocols based on the authenticated entanglement channel
- CERTAIN QUANTUM KEY DISTRIBUTION ACHIEVED BY USING BELL STATES
- Quantum key distribution with quantum walks
- scientific article; zbMATH DE number 7589881
authenticationeavesdropping detectionEPR pairsextended unitary operationsfountain codeskey distribution protocols
Cryptography (94A60) Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- A single quantum cannot be cloned
- New circular quantum secret sharing for remote agents
- Entanglement is Not Necessary for Perfect Discrimination between Unitary Operations
- Title not available (Why is that?)
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Quantum Cryptography Based on Orthogonal States
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
Cited In (1)
This page was built for publication: A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2018188)