Key-leakage evaluation of authentication in quantum key distribution with finite resources
From MaRDI portal
Publication:2454246
DOI10.1007/s11128-013-0703-9zbMath1291.81126OpenAlexW2080960612MaRDI QIDQ2454246
Yang Wang, Wan-Su Bao, Chun Zhou, Xiang-Qun Fu, Hong-Wei Li
Publication date: 13 June 2014
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-013-0703-9
quantum key distributioncomposable securityauthentication keyfinite-length keyinformation leakageskey lifetime
Related Items (1)
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations
- Efficient quantum key distribution scheme and a proof of its unconditional security
- New hash functions and their use in authentication and set equality
- Key Recycling in Authentication
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Security Aspects of the Authentication Used in Quantum Cryptography
- Generalized privacy amplification
- The Operational Meaning of Min- and Max-Entropy
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Key-leakage evaluation of authentication in quantum key distribution with finite resources