SECURITY OF QUANTUM KEY DISTRIBUTION
From MaRDI portal
Publication:3525381
DOI10.1142/S0219749908003256zbMath1151.81007arXivquant-ph/0512258MaRDI QIDQ3525381
Publication date: 12 September 2008
Published in: International Journal of Quantum Information (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0512258
Related Items
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker, Security Bounds for Quantum Cryptography with Finite Resources, A generalization of quantum Stein's lemma, Quantum cryptography, One-and-a-half quantum de Finetti theorems, Composable Security in the Bounded-Quantum-Storage Model, Quantum Key Distribution
Cites Work
- Unnamed Item
- Efficient quantum key distribution scheme and a proof of its unconditional security
- A proof of the security of quantum key distribution
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Randomizing quantum states: constructions and applications
- Optimal randomizer efficiency in the bounded-storage model
- Unconditional security in quantum cryptography
- A de Finetti representation for finite symmetric quantum states
- On the Power of Quantum Memory
- Communication Theory of Secrecy Systems*
- Matrix Analysis
- Privacy Amplification by Public Discussion
- Locally normal symmetric states and an analogue of de Finetti's theorem
- Secret key agreement by public discussion from common information
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Proof of security of quantum key distribution with two-way classical communications
- Generalized privacy amplification
- Distillation of secret key and entanglement from quantum states