SECURITY OF QUANTUM KEY DISTRIBUTION
From MaRDI portal
Publication:3525381
DOI10.1142/S0219749908003256zbMath1151.81007arXivquant-ph/0512258OpenAlexW2995235436MaRDI QIDQ3525381
Publication date: 12 September 2008
Published in: International Journal of Quantum Information (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0512258
Related Items
Quantum Rényi divergences and the strong converse exponent of state discrimination in operator algebras ⋮ The strong converse exponent of discriminating infinite-dimensional quantum states ⋮ Entanglement Dynamics of Two V‐type Atoms with Dipole–Dipole Interaction in Dissipative Cavity ⋮ Beyond islands: a free probabilistic approach ⋮ Bounds for smooth min- and max-entropy ⋮ Generalized smooth mutual max-information of quantum channel ⋮ Entropic uncertainty relations for \((N, M)\)-POVMs ⋮ Role of Steering Inequality in Quantum Key Distribution Protocol ⋮ Distribution of secret keys in a quantum network with trusted intermediate nodes;Распределение секретных ключей в квантовой сети с доверенными промежуточными узлами ⋮ De Finetti theorems for quantum conditional probability distributions with symmetry ⋮ On rejection sampling in Lyubashevsky's signature scheme ⋮ Asymmetric bidirectional hierarchical controlled quantum information transmission ⋮ Categorical composable cryptography: extended version ⋮ Categorical composable cryptography ⋮ Operational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponents ⋮ Quantum de Finetti theorems under local measurements with applications ⋮ Soft decoding of short/medium length codes using ordered statistics for quantum key distribution ⋮ The holographic entropy zoo ⋮ Swiveled Rényi entropies ⋮ Distributing secret keys with quantum continuous variables: principle, security and implementations ⋮ Secure certification of mixed quantum states with application to two-party randomness generation ⋮ Strong converse exponents for a quantum channel discrimination problem and quantum-feedback-assisted communication ⋮ Telescopic Relative Entropy ⋮ TOMOGRAPHIC QUANTUM CRYPTOGRAPHY PROTOCOLS ARE REFERENCE FRAME INDEPENDENT ⋮ One-and-a-half quantum de Finetti theorems ⋮ Quantum Bilinear Optimization ⋮ Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system ⋮ Relating different quantum generalizations of the conditional Rényi entropy ⋮ Two-way unclonable encryption with a vulnerable sender ⋮ The minimum Rényi entropy output of a quantum channel is locally additive ⋮ A modular framework for quantum-proof randomness extractors ⋮ Unifying treatment of discord via relative entropy ⋮ Composable and finite computational security of quantum message transmission ⋮ Position-momentum uncertainty relations in the presence of quantum memory ⋮ Strong converse exponent for classical-quantum channel coding ⋮ Universal Security for Randomness Expansion from the Spot-Checking Protocol ⋮ Quantum sampling and entropic uncertainty ⋮ Continuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent security ⋮ Practical measurement-device-independent quantum key distribution with advantage distillation ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ A fermionic de Finetti theorem ⋮ Measurement device-independent quantum dialogue ⋮ Fundamental finite key limits for one-way information reconciliation in quantum key distribution ⋮ Implementation of quantum key distribution network simulation module in the network simulator NS-3 ⋮ Recoupling coefficients and quantum entropies ⋮ Improving the teleportation scheme of three-qubit state with a four-qubit quantum channel ⋮ Quantum cryptography beyond quantum key distribution ⋮ Computational indistinguishability between quantum states and its cryptographic application ⋮ Composable Security in the Bounded-Quantum-Storage Model ⋮ Asymptotic convertibility of entanglement: An information-spectrum approach to entanglement concentration and dilution ⋮ A \((t,n)\)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transform ⋮ Entropy accumulation ⋮ Implementation of an E-payment security evaluation system based on quantum blind computing ⋮ Asymmetric ``4+2 protocol for quantum key distribution with finite resources ⋮ Asymptotic performance of port-based teleportation ⋮ One-shot decoupling ⋮ Characterizing entropy in statistical physics and in quantum information theory ⋮ Simple and Tight Device-Independent Security Proofs ⋮ Thermodynamic work cost of quantum estimation protocols ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Key-leakage evaluation of authentication in quantum key distribution with finite resources ⋮ Decomposition rules for quantum Rényi mutual information with an application to information exclusion relations ⋮ Steganography protocols for quantum channels ⋮ Secure Random Number Generation in Continuous Variable Systems ⋮ Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs ⋮ SU(p,q) coherent states and a Gaussian de Finetti theorem ⋮ Phase-matching quantum key distribution based on pulse-position modulation ⋮ Improving the teleportation scheme of five-qubit state with a seven-qubit quantum channel ⋮ Quantum conditional mutual information and approximate Markov chains ⋮ Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states ⋮ Quantum Key Distribution ⋮ Optimal attacks on qubit-based quantum key recycling ⋮ Weak locking capacity of quantum channels can be much larger than private capacity ⋮ Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states ⋮ Necessary criterion for approximate recoverability ⋮ The resource theory of informational nonequilibrium in thermodynamics ⋮ High-dimensional circular quantum secret sharing using orbital angular momentum ⋮ Security proof for round-robin differential phase shift QKD ⋮ Monitoring the intercept-resend attack with the weak measurement model ⋮ Practical aspects of terahertz wireless quantum key distribution in indoor environments ⋮ A generalization of quantum Stein's lemma ⋮ Quantum hypothesis testing and the operational interpretation of the quantum Rényi relative entropies ⋮ Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis ⋮ Quantum cryptography ⋮ The quantum reverse Shannon theorem based on one-shot information theory ⋮ Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker ⋮ Two-party quantum private comparison protocol with maximally entangled seven-qubit state ⋮ Geometric Rényi divergence and its applications in quantum channel capacities ⋮ Thermodynamic implementations of quantum processes ⋮ Entanglement-assisted private communication over quantum broadcast channels ⋮ Most boson quantum states are almost maximally entangled ⋮ De Finetti theorems for braided parafermions ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker ⋮ Preface ⋮ Preface ⋮ Schur-Weyl duality for the Clifford group with applications: property testing, a robust Hudson theorem, and de Finetti representations ⋮ A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys ⋮ Active beam splitting attack applied to differential phase shift quantum key distribution protocol ⋮ Efficient mediated semi-quantum key distribution ⋮ QUANTUM KEY DISTRIBUTION WITH REALISTIC HERALDED SINGLE-PHOTON SOURCES ⋮ Two-sided bounds on minimum-error quantum measurement, on the reversibility of quantum dynamics, and on maximum overlap using directional iterates ⋮ Simulation of a Random Variable and its Application to Game Theory ⋮ Quantum coherence via conditional entropy ⋮ Security Bounds for Quantum Cryptography with Finite Resources ⋮ Optimal quantum networks and one-shot entropies ⋮ Distilling entanglement from arbitrary resources ⋮ Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce ⋮ Multiparty mediated quantum secret sharing protocol ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? ⋮ Estimating security of the quantum key distribution from the guesswork ⋮ Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages ⋮ Recovery from an eavesdropping attack on a qubit of a graph state ⋮ Quantum Authentication and Encryption with Key Recycling ⋮ Rényi entropy uncertainty relation for successive projective measurements
Cites Work
- Unnamed Item
- Efficient quantum key distribution scheme and a proof of its unconditional security
- A proof of the security of quantum key distribution
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Randomizing quantum states: constructions and applications
- Optimal randomizer efficiency in the bounded-storage model
- Unconditional security in quantum cryptography
- A de Finetti representation for finite symmetric quantum states
- On the Power of Quantum Memory
- Communication Theory of Secrecy Systems*
- Matrix Analysis
- Privacy Amplification by Public Discussion
- Locally normal symmetric states and an analogue of de Finetti's theorem
- Secret key agreement by public discussion from common information
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Proof of security of quantum key distribution with two-way classical communications
- Generalized privacy amplification
- Distillation of secret key and entanglement from quantum states