Full Security of Quantum Key Distribution From No-Signaling Constraints
From MaRDI portal
Publication:2986235
Cited in
(10)- No-signaling quantum key distribution: solution by linear programming
- Post-quantum signal key agreement from SIDH
- De Finetti reductions for correlations
- Laws of nature as constraints
- Information-based measure of nonlocality
- Large violation of Bell inequalities with low entanglement
- Simple and tight device-independent security proofs
- scientific article; zbMATH DE number 5595862 (Why is no real title available?)
- The impossibility of non-signaling privacy amplification
- Quantum cryptography: key distribution and beyond
This page was built for publication: Full Security of Quantum Key Distribution From No-Signaling Constraints
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2986235)