Device independent quantum key distribution using three-party pseudo-telepathy
From MaRDI portal
Publication:2179409
Recommendations
- Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query
- Security of Device-Independent Quantum Key Distribution Protocols
- Efficient device-independent quantum key distribution
- Simple and tight device-independent security proofs
- Secure device-independent quantum bit-wise XOR summation based on a pseudo-telepathy game
Cites work
- scientific article; zbMATH DE number 2086702 (Why is no real title available?)
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography
- Algorithms and Data Structures
- Another look at ``provable security
- From Bell's theorem to secure quantum key distribution
- Maximally Entangled State in Pseudo-Telepathy Games
- One-sided device-independent QKD and position-based cryptography from monogamy games
- Parallel Device-Independent Quantum Key Distribution
- Proposed experiment to test local hidden-variable theories
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- Quantum pseudo-telepathy
- Semiquantum key distribution
- The Operational Meaning of Min- and Max-Entropy
Cited in
(8)- One-sided device-independent QKD and position-based cryptography from monogamy games
- Insider-proof encryption with applications for quantum key distribution
- Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query
- Analysis of Boolean functions related to binary input binary output two-party nonlocal games
- Device-independent quantum key distribution using random quantum states
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography
- Secure device-independent quantum bit-wise XOR summation based on a pseudo-telepathy game
- Simple and tight device-independent security proofs
This page was built for publication: Device independent quantum key distribution using three-party pseudo-telepathy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2179409)