A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
From MaRDI portal
Publication:2018188
Recommendations
- Unconditional security of a \(K\)-state quantum key distribution protocol
- Quantum deterministic key distribution protocols based on the authenticated entanglement channel
- CERTAIN QUANTUM KEY DISTRIBUTION ACHIEVED BY USING BELL STATES
- Quantum key distribution with quantum walks
- scientific article; zbMATH DE number 7589881
Cites work
- A single quantum cannot be cloned
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Entanglement is not necessary for perfect discrimination between unitary operations
- New circular quantum secret sharing for remote agents
- Quantum Cryptography Based on Orthogonal States
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
- Security of quantum key distribution with imperfect devices
Cited in
(7)- A NEW QUANTUM KEY DISTRIBUTION PROTOCOL BASED ON QUANTUM FARADAY ROTATION
- Quantum key distribution with quantum walks
- Practical demonstration of quantum key distribution protocol with error correction mechanism
- Unconditional security of a \(K\)-state quantum key distribution protocol
- Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
This page was built for publication: A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2018188)