Unconditional security in quantum cryptography

From MaRDI portal
Publication:3196618

DOI10.1145/382780.382781zbMath1323.94128arXivquant-ph/9802025OpenAlexW2120755151MaRDI QIDQ3196618

Dominic Mayers

Publication date: 30 October 2015

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/9802025




Related Items (only showing first 100 items - show all)

Semiquantum key distributionOptimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum MoneyUnconditional security in quantum cryptographyTrading quantum for classical resources in quantum data compressionHigh-dimensional quantum key agreement protocol with pairs of single quditsParameter optimization in decoy-state phase-matching quantum key distributionThree Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum MeasurementSimple proof of security of the multiparty prepare and measure QKDTwin-field quantum encryption protocol for E-payment based on blockchainSecure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodologyCONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHMA \((t, n)\) Threshold quantum secret sharing scheme with fairnessMulti-partite entanglement can speed up quantum key distribution in networksFrequency shift attack on ‘plug-and-play’ quantum key distribution systemsCategorical composable cryptography: extended versionCategorical composable cryptographyImproved statistical fluctuation analysis for twin-field quantum key distributionStatistical fluctuation analysis for decoy-state quantum secure direct communicationUnnamed ItemSECURITY OF QUANTUM KEY DISTRIBUTIONSECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOLSecurity analysis of an untrusted source for quantum key distribution: passive approachQuantum Cryptography: Key Distribution and BeyondConcise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengthsPractical aspects of measurement-device-independent quantum key distributionSecurity analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengthsTriggering parametric-down conversion-based quantum key distribution via radiation fieldSymmetric extendibility for qudits and tolerable error rates in quantum cryptographyQUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATESTHE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTRemote preparation of arbitrary ensembles and quantum bit commitmentTechniques for Formal Modelling and Analysis of Quantum SystemsREALIZABLE QUANTUM BROADCASTING MULTI-SIGNATURE SCHEMEPrefacePrefaceQuantum entanglementA Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster StateThree-Party Quantum Key Agreement Protocol Based on Continuous Variable Single-Mode Squeezed States*Equational Reasoning About Quantum ProtocolsAn improved E-payment protocol based on quantum blind signature without entanglementQuantum Key Distribution with Classical BobSemi device independence of the BB84 protocolNOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATIONAN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSIONClassical Knowledge for Quantum Cryptographic ReasoningOblivious transfer based on single-qubit rotationsA quantum multi-proxy blind signature scheme based on genuine four-qubit entangled stateMeasurement-device-independent quantum key distribution with q-plateEnhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sourcesA third-party E-payment protocol based on quantum multi-proxy blind signatureA quantum proxy blind signature scheme based on genuine five-qubit entangled stateSplitting information securely with entanglementA new protocol and lower bounds for quantum coin flippingA voting protocol based on the controlled quantum operation teleportationRealization of error correction and reconciliation of continuous quantum key distribution in detailThe enhanced measurement-device-independent quantum key distribution with two-intensity decoy statesThe statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sourcesMeasurement device-independent quantum key distribution with heralded pair coherent stateA electronic voting scheme achieved by using quantum proxy signatureAttack and improvements of fair quantum blind signature schemesQuantum \((t,n)\) threshold proxy blind signature scheme based on Bell statesSecret sharing based on quantum Fourier transformSecurity of the Bennett-Brassard quantum key distribution protocol against collective attacksA quantum multi-proxy multi-blind-signature scheme based on genuine six-qubit entangled stateNovel quantum virtual private network scheme for PON via quantum secure direct communicationSecurity analyses and improvement of arbitrated quantum signature with an untrusted arbitratorNew quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum statesA third-party E-payment protocol based on quantum group blind signatureSimple analysis of security of the BB84 quantum key distribution protocolQuantum key distribution with no shared reference frameDecoy-state round-robin differential-phase-shift quantum key distribution with source errorsPredicting optimal parameters with random forest for quantum key distributionA new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent lightEfficient bit sifting scheme of post-processing in quantum key distributionTwo-way deterministic quantum key distribution against passive detector side channel attacks in the forward lineA trusted third-party E-payment protocol based on locally indistinguishable orthogonal product statesHigh-dimensional measurement-device-independent quantum secure direct communicationPlug-and-play sending-or-not-sending twin-field quantum key distributionPhase-matching quantum key distribution based on heralded pair-coherent sourceMediated semi-quantum secure direct communicationDifferential phase encoded measurement-device-independent quantum key distributionA novel quantum E-payment protocol based on blockchainAn improved quantum proxy blind signature scheme based on genuine seven-qubit entangled stateFundamental finite key limits for one-way information reconciliation in quantum key distributionQuantum identity authentication with single photonParameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuationsAn improved proposal on the practical quantum key distribution with biased basisQuantum cryptography beyond quantum key distributionComputational indistinguishability between quantum states and its cryptographic applicationAn E-payment protocol based on quantum multi-proxy blind signatureEntropy accumulationOn the existence of quantum signature for quantum messagesQuantum proxy multi-signature scheme using genuinely entangled six qubits stateA quantum proxy weak blind signature schemeAn online banking system based on quantum cryptography communicationA quantum proxy signature scheme based on genuine five-qubit entangled stateThe black paper of quantum cryptography: real implementation problemsUsing quantum key distribution for cryptographic purposes: a surveyA practical protocol for three-party authenticated quantum key distributionAnalysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency



Cites Work


This page was built for publication: Unconditional security in quantum cryptography