Unconditional security in quantum cryptography
From MaRDI portal
Publication:3196618
DOI10.1145/382780.382781zbMath1323.94128arXivquant-ph/9802025OpenAlexW2120755151MaRDI QIDQ3196618
Publication date: 30 October 2015
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/9802025
Related Items (only showing first 100 items - show all)
Semiquantum key distribution ⋮ Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money ⋮ Unconditional security in quantum cryptography ⋮ Trading quantum for classical resources in quantum data compression ⋮ High-dimensional quantum key agreement protocol with pairs of single qudits ⋮ Parameter optimization in decoy-state phase-matching quantum key distribution ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Simple proof of security of the multiparty prepare and measure QKD ⋮ Twin-field quantum encryption protocol for E-payment based on blockchain ⋮ Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology ⋮ CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM ⋮ A \((t, n)\) Threshold quantum secret sharing scheme with fairness ⋮ Multi-partite entanglement can speed up quantum key distribution in networks ⋮ Frequency shift attack on ‘plug-and-play’ quantum key distribution systems ⋮ Categorical composable cryptography: extended version ⋮ Categorical composable cryptography ⋮ Improved statistical fluctuation analysis for twin-field quantum key distribution ⋮ Statistical fluctuation analysis for decoy-state quantum secure direct communication ⋮ Unnamed Item ⋮ SECURITY OF QUANTUM KEY DISTRIBUTION ⋮ SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL ⋮ Security analysis of an untrusted source for quantum key distribution: passive approach ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths ⋮ Practical aspects of measurement-device-independent quantum key distribution ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ Triggering parametric-down conversion-based quantum key distribution via radiation field ⋮ Symmetric extendibility for qudits and tolerable error rates in quantum cryptography ⋮ QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ Remote preparation of arbitrary ensembles and quantum bit commitment ⋮ Techniques for Formal Modelling and Analysis of Quantum Systems ⋮ REALIZABLE QUANTUM BROADCASTING MULTI-SIGNATURE SCHEME ⋮ Preface ⋮ Preface ⋮ Quantum entanglement ⋮ A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State ⋮ Three-Party Quantum Key Agreement Protocol Based on Continuous Variable Single-Mode Squeezed States* ⋮ Equational Reasoning About Quantum Protocols ⋮ An improved E-payment protocol based on quantum blind signature without entanglement ⋮ Quantum Key Distribution with Classical Bob ⋮ Semi device independence of the BB84 protocol ⋮ NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION ⋮ AN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSION ⋮ Classical Knowledge for Quantum Cryptographic Reasoning ⋮ Oblivious transfer based on single-qubit rotations ⋮ A quantum multi-proxy blind signature scheme based on genuine four-qubit entangled state ⋮ Measurement-device-independent quantum key distribution with q-plate ⋮ Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources ⋮ A third-party E-payment protocol based on quantum multi-proxy blind signature ⋮ A quantum proxy blind signature scheme based on genuine five-qubit entangled state ⋮ Splitting information securely with entanglement ⋮ A new protocol and lower bounds for quantum coin flipping ⋮ A voting protocol based on the controlled quantum operation teleportation ⋮ Realization of error correction and reconciliation of continuous quantum key distribution in detail ⋮ The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states ⋮ The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources ⋮ Measurement device-independent quantum key distribution with heralded pair coherent state ⋮ A electronic voting scheme achieved by using quantum proxy signature ⋮ Attack and improvements of fair quantum blind signature schemes ⋮ Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states ⋮ Secret sharing based on quantum Fourier transform ⋮ Security of the Bennett-Brassard quantum key distribution protocol against collective attacks ⋮ A quantum multi-proxy multi-blind-signature scheme based on genuine six-qubit entangled state ⋮ Novel quantum virtual private network scheme for PON via quantum secure direct communication ⋮ Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator ⋮ New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states ⋮ A third-party E-payment protocol based on quantum group blind signature ⋮ Simple analysis of security of the BB84 quantum key distribution protocol ⋮ Quantum key distribution with no shared reference frame ⋮ Decoy-state round-robin differential-phase-shift quantum key distribution with source errors ⋮ Predicting optimal parameters with random forest for quantum key distribution ⋮ A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light ⋮ Efficient bit sifting scheme of post-processing in quantum key distribution ⋮ Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line ⋮ A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states ⋮ High-dimensional measurement-device-independent quantum secure direct communication ⋮ Plug-and-play sending-or-not-sending twin-field quantum key distribution ⋮ Phase-matching quantum key distribution based on heralded pair-coherent source ⋮ Mediated semi-quantum secure direct communication ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ A novel quantum E-payment protocol based on blockchain ⋮ An improved quantum proxy blind signature scheme based on genuine seven-qubit entangled state ⋮ Fundamental finite key limits for one-way information reconciliation in quantum key distribution ⋮ Quantum identity authentication with single photon ⋮ Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations ⋮ An improved proposal on the practical quantum key distribution with biased basis ⋮ Quantum cryptography beyond quantum key distribution ⋮ Computational indistinguishability between quantum states and its cryptographic application ⋮ An E-payment protocol based on quantum multi-proxy blind signature ⋮ Entropy accumulation ⋮ On the existence of quantum signature for quantum messages ⋮ Quantum proxy multi-signature scheme using genuinely entangled six qubits state ⋮ A quantum proxy weak blind signature scheme ⋮ An online banking system based on quantum cryptography communication ⋮ A quantum proxy signature scheme based on genuine five-qubit entangled state ⋮ The black paper of quantum cryptography: real implementation problems ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency
Cites Work
This page was built for publication: Unconditional security in quantum cryptography