Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
From MaRDI portal
Publication:3452365
DOI10.1007/3-540-68697-5_26zbMath1329.94073arXivquant-ph/9606003OpenAlexW2157769965MaRDI QIDQ3452365
Publication date: 11 November 2015
Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/9606003
Related Items
The security analysis of the BB84 protocol in the case of Calderbank–Shor–Steane code leakage ⋮ A cooperative quantum anonymous transmission with hybrid entanglement swapping ⋮ Efficient bit sifting scheme of post-processing in quantum key distribution ⋮ Optimizing the decoy-state BB84 QKD protocol parameters ⋮ Quantum cryptography beyond quantum key distribution ⋮ Bipartite coherent-state quantum key distribution with strong reference pulse ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ A monogamy-of-entanglement game with applications to device-independent quantum cryptography ⋮ Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs ⋮ Triggering parametric-down conversion-based quantum key distribution via radiation field ⋮ SECURITY OF QUANTUM KEY DISTRIBUTION WITH STRONG PHASE-REFERENCE PULSE ⋮ Unconditional security of a \(K\)-state quantum key distribution protocol ⋮ Side channel passive quantum key distribution with one uninformative state ⋮ Quantum cryptography ⋮ Quantum key distribution protocol using random bases ⋮ Why quantum bit commitment and ideal quantum coin tossing are impossible.
Cites Work
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Experimental quantum cryptography.
- Oblivious transfers and intersecting codes
- Quantum Oblivious Transfer
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem