SECURITY OF QUANTUM KEY DISTRIBUTION

From MaRDI portal
Publication:3525381

DOI10.1142/S0219749908003256zbMath1151.81007arXivquant-ph/0512258OpenAlexW2995235436MaRDI QIDQ3525381

Renato Renner

Publication date: 12 September 2008

Published in: International Journal of Quantum Information (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0512258




Related Items

Quantum Rényi divergences and the strong converse exponent of state discrimination in operator algebrasThe strong converse exponent of discriminating infinite-dimensional quantum statesEntanglement Dynamics of Two V‐type Atoms with Dipole–Dipole Interaction in Dissipative CavityBeyond islands: a free probabilistic approachBounds for smooth min- and max-entropyGeneralized smooth mutual max-information of quantum channelEntropic uncertainty relations for \((N, M)\)-POVMsRole of Steering Inequality in Quantum Key Distribution ProtocolDistribution of secret keys in a quantum network with trusted intermediate nodes;Распределение секретных ключей в квантовой сети с доверенными промежуточными узламиDe Finetti theorems for quantum conditional probability distributions with symmetryOn rejection sampling in Lyubashevsky's signature schemeAsymmetric bidirectional hierarchical controlled quantum information transmissionCategorical composable cryptography: extended versionCategorical composable cryptographyOperational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponentsQuantum de Finetti theorems under local measurements with applicationsSoft decoding of short/medium length codes using ordered statistics for quantum key distributionThe holographic entropy zooSwiveled Rényi entropiesDistributing secret keys with quantum continuous variables: principle, security and implementationsSecure certification of mixed quantum states with application to two-party randomness generationStrong converse exponents for a quantum channel discrimination problem and quantum-feedback-assisted communicationTelescopic Relative EntropyTOMOGRAPHIC QUANTUM CRYPTOGRAPHY PROTOCOLS ARE REFERENCE FRAME INDEPENDENTOne-and-a-half quantum de Finetti theoremsQuantum Bilinear OptimizationInformatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution systemRelating different quantum generalizations of the conditional Rényi entropyTwo-way unclonable encryption with a vulnerable senderThe minimum Rényi entropy output of a quantum channel is locally additiveA modular framework for quantum-proof randomness extractorsUnifying treatment of discord via relative entropyComposable and finite computational security of quantum message transmissionPosition-momentum uncertainty relations in the presence of quantum memoryStrong converse exponent for classical-quantum channel codingUniversal Security for Randomness Expansion from the Spot-Checking ProtocolQuantum sampling and entropic uncertaintyContinuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent securityPractical measurement-device-independent quantum key distribution with advantage distillationDifferential phase encoded measurement-device-independent quantum key distributionA fermionic de Finetti theoremMeasurement device-independent quantum dialogueFundamental finite key limits for one-way information reconciliation in quantum key distributionImplementation of quantum key distribution network simulation module in the network simulator NS-3Recoupling coefficients and quantum entropiesImproving the teleportation scheme of three-qubit state with a four-qubit quantum channelQuantum cryptography beyond quantum key distributionComputational indistinguishability between quantum states and its cryptographic applicationComposable Security in the Bounded-Quantum-Storage ModelAsymptotic convertibility of entanglement: An information-spectrum approach to entanglement concentration and dilutionA \((t,n)\)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transformEntropy accumulationImplementation of an E-payment security evaluation system based on quantum blind computingAsymmetric ``4+2 protocol for quantum key distribution with finite resourcesAsymptotic performance of port-based teleportationOne-shot decouplingCharacterizing entropy in statistical physics and in quantum information theorySimple and Tight Device-Independent Security ProofsThermodynamic work cost of quantum estimation protocolsUsing quantum key distribution for cryptographic purposes: a surveyKey-leakage evaluation of authentication in quantum key distribution with finite resourcesDecomposition rules for quantum Rényi mutual information with an application to information exclusion relationsSteganography protocols for quantum channelsSecure Random Number Generation in Continuous Variable SystemsTwo-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofsSU(p,q) coherent states and a Gaussian de Finetti theoremPhase-matching quantum key distribution based on pulse-position modulationImproving the teleportation scheme of five-qubit state with a seven-qubit quantum channelQuantum conditional mutual information and approximate Markov chainsCollusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster statesQuantum Key DistributionOptimal attacks on qubit-based quantum key recyclingWeak locking capacity of quantum channels can be much larger than private capacityImprovement of ``Novel multiparty quantum key agreement protocol with GHZ statesNecessary criterion for approximate recoverabilityThe resource theory of informational nonequilibrium in thermodynamicsHigh-dimensional circular quantum secret sharing using orbital angular momentumSecurity proof for round-robin differential phase shift QKDMonitoring the intercept-resend attack with the weak measurement modelPractical aspects of terahertz wireless quantum key distribution in indoor environmentsA generalization of quantum Stein's lemmaQuantum hypothesis testing and the operational interpretation of the quantum Rényi relative entropiesComposable security against collective attacks of a modified BB84 QKD protocol with information only in one basisQuantum cryptographyThe quantum reverse Shannon theorem based on one-shot information theoryRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerTwo-party quantum private comparison protocol with maximally entangled seven-qubit stateGeometric Rényi divergence and its applications in quantum channel capacitiesThermodynamic implementations of quantum processesEntanglement-assisted private communication over quantum broadcast channelsMost boson quantum states are almost maximally entangledDe Finetti theorems for braided parafermionsPrecise evaluation of leaked information with secure randomness extraction in the presence of quantum attackerPrefacePrefaceSchur-Weyl duality for the Clifford group with applications: property testing, a robust Hudson theorem, and de Finetti representationsA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysActive beam splitting attack applied to differential phase shift quantum key distribution protocolEfficient mediated semi-quantum key distributionQUANTUM KEY DISTRIBUTION WITH REALISTIC HERALDED SINGLE-PHOTON SOURCESTwo-sided bounds on minimum-error quantum measurement, on the reversibility of quantum dynamics, and on maximum overlap using directional iteratesSimulation of a Random Variable and its Application to Game TheoryQuantum coherence via conditional entropySecurity Bounds for Quantum Cryptography with Finite ResourcesOptimal quantum networks and one-shot entropiesDistilling entanglement from arbitrary resourcesQuantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerceMultiparty mediated quantum secret sharing protocolA short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?Estimating security of the quantum key distribution from the guessworkQuantum and semi-quantum sealed-bid auction: vulnerabilities and advantagesRecovery from an eavesdropping attack on a qubit of a graph stateQuantum Authentication and Encryption with Key RecyclingRényi entropy uncertainty relation for successive projective measurements



Cites Work