Proof of security of quantum key distribution with two-way classical communications
From MaRDI portal
Publication:4679922
DOI10.1109/TIT.2002.807289zbMath1063.94081arXivquant-ph/0105121OpenAlexW2165923712MaRDI QIDQ4679922
Hoi-Kwong Lo, Daniel Gottesman
Publication date: 31 May 2005
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0105121
Related Items (35)
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ The Locking-Decoding Frontier for Generic Dynamics ⋮ NOTES ON THE FIDELITY OF SYMPLECTIC QUANTUM ERROR-CORRECTING CODES ⋮ Indistinguishability of pure orthogonal product states by LOCC ⋮ Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom ⋮ Hopf cyclic cohomology and Chern character of equivariant \(K\)-theories ⋮ One-time pads cannot be used to improve the efficiency of quantum communication ⋮ De Finetti theorems for quantum conditional probability distributions with symmetry ⋮ Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement ⋮ Frequency shift attack on ‘plug-and-play’ quantum key distribution systems ⋮ Quantum Bell states-based anonymous voting with anonymity trace ⋮ Operator structures and quantum one-way LOCC conditions ⋮ SECURITY OF QUANTUM KEY DISTRIBUTION ⋮ SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL ⋮ Cryptanalysis and improvement of multiparty quantum secret sharing schemes ⋮ Everything you always wanted to know about LOCC (but were afraid to ask) ⋮ Optimal axis compensation in quantum key distribution protocols over unital channels ⋮ Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs ⋮ Role of Bell-CHSH violation and local filtering in quantum key distribution ⋮ Quantum private comparison over noisy channels ⋮ Symmetric extendibility for qudits and tolerable error rates in quantum cryptography ⋮ A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks ⋮ Monitoring the intercept-resend attack with the weak measurement model ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs ⋮ Practical entanglement distillation scheme using recurrence method and quantum low density parity check codes ⋮ ONE-PARTY QUANTUM-ERROR-CORRECTING CODES FOR UNBALANCED ERRORS: PRINCIPLES AND APPLICATION TO QUANTUM DENSE CODING AND QUANTUM SECURE DIRECT COMMUNICATION ⋮ Quantum cryptography ⋮ Controlled probabilistic quantum key distribution using a ground state ⋮ Quantum entanglement ⋮ Verification of Quantum Protocols with a Probabilistic Model-Checker ⋮ The locking-decoding frontier for generic dynamics ⋮ Security Bounds for Quantum Cryptography with Finite Resources ⋮ NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION ⋮ Individual attacks with generalized discrimination and inadequacy of some information measures
This page was built for publication: Proof of security of quantum key distribution with two-way classical communications