Quantum cryptography: public key distribution and coin tossing
From MaRDI portal
Publication:477162
DOI10.1016/J.TCS.2014.05.025zbMATH Open1306.81030arXiv2003.06557OpenAlexW2015179126WikidataQ29011667 ScholiaQ29011667MaRDI QIDQ477162FDOQ477162
Authors: Charles H. Bennett, Gilles Brassard
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Abstract: When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to distribute random key information between two users with the assurance that it remains unknown to anyone else, even when the users share no secret information initially. We also present a protocol for coin-tossing by exchange of quantum messages, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Full work available at URL: https://arxiv.org/abs/2003.06557
Recommendations
- Quantum cryptography: key distribution and beyond
- scientific article; zbMATH DE number 1759776
- Quantum public-key cryptosystem
- Quantum key distribution
- Quantum Key Distribution
- Quantum-Secure Coin-Flipping and Applications
- Quantum cryptography. From key distribution to conference key agreement
- Quantum cryptography
- Quantum cryptography
- Quantum cryptography
Cites Work
Cited In (only showing first 100 items - show all)
- Electronic voting scheme based on a quantum ring signature
- Information processing in convex operational theories
- Fault-tolerant quantum secure direct communication protocol based on decoherence-free states
- Relativistic quantum private database queries
- Improved secure multiparty computation with a dishonest majority via quantum means
- An arbitrated quantum signature protocol based on the chained CNOT operations encryption
- Quantum symmetrically-private information retrieval
- Teleportation-based continuous variable quantum cryptography
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- The performance of three-intensity decoy-state measurement-device-independent quantum key distribution
- An efficient quantum identity authentication key agreement protocol without entanglement
- Device-independent quantum key distribution using random quantum states
- Phase-matching quantum key distribution based on heralded pair-coherent source
- A practical quantum designated verifier signature scheme for E-voting applications
- A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information
- Cryptanalysis and improvement of some quantum proxy blind signature schemes
- Cryptanalysis of a quantum proxy weak blind signature scheme
- Authenticated multi-user quantum key distribution with single particles
- A novel quantum blind signature scheme with four-particle cluster states
- Hyper CNOT and hyper Bell-state analysis assisted by quantum dots in double-side optical microcavities
- Secure quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and Bell state
- A graph theoretical approach to states and unitary operations
- Collusive attacks to ``circle-type multi-party quantum key agreement protocols
- Controlled quantum secure direct communication by entanglement distillation or generalized measurement
- Efficient multiparty quantum key agreement protocol based on commutative encryption
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Dynamic quantum secret sharing protocol based on GHZ state
- Multi-party quantum private comparison protocol with \(n\)-level entangled states
- Restricted attacks on semi-quantum key distribution protocols
- Semiquantum key distribution without invoking the classical party's measurement capability
- Sharing the quantum state and the classical information simultaneously
- D-concurrence bounds for pair coherent states
- Comment on: ``Secure direct communication based on ping-pong protocol
- New quantum private comparison protocol using \(\chi \)-type state
- Multi-party quantum private comparison protocol based on \(d\)-dimensional entangled states
- Quantum key agreement protocols with four-qubit cluster states
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
- Multiparty semiquantum key agreement with \(d\)-level single-particle states
- Secure direct communication based on ping-pong protocol
- An enhanced proposal on decoy-state measurement device-independent quantum key distribution
- Authenticated semi-quantum key distributions without classical channel
- Novel classical post-processing for quantum key distribution-based quantum private query
- Continuous-variable quantum identity authentication based on quantum teleportation
- Study on the security of the authentication scheme with key recycling in QKD
- Efficient quantum dialogue using entangled states and entanglement swapping without information leakage
- Fault-tolerant quantum blind signature protocols against collective noise
- Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system
- Quantum private query based on single-photon interference
- Quantum cloning attacks against PUF-based quantum authentication systems
- Quantum cloning disturbed by thermal Davies environment
- The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources
- Security analysis of an arbitrated quantum signature scheme with Bell states
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
- Efficient arbitrated quantum signature and its proof of security
- Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels
- A new quantum blind signature with unlinkability
- Multi-party quantum key agreement without entanglement
- Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links
- Multi-proxy strong blind quantum signature scheme
- Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations
- Practical covert quantum key distribution with decoy-state method
- Quantum identity authentication without entanglement
- Quantum dialogue protocol with continuous-variable single-mode squeezed states
- Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states
- Quantum private comparison protocol with \(d\)-dimensional Bell states
- Fault-tolerant authenticated quantum dialogue using logical Bell states
- Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
- Quantum direct communication protocol strengthening against Pavičić's attack
- Quantum anonymous voting protocol with the privacy protection of the candidate
- Protecting single-photon entanglement with imperfect single-photon source
- A quantum protocol for millionaire problem with Bell states
- A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light
- Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises
- Quantum multi-proxy blind signature based on cluster state
- Quantum private comparison based on GHZ entangled states
- Multi-user private comparison protocol using GHZ class states
- Quantum key distribution scheme with key recycling in integrated optical network
- Two-qubit quantum state sharing protocol based on Bell state
- Teleportation of atomic external states on the internal degrees of freedom
- A new protocol and lower bounds for quantum coin flipping
- Multi-party quantum key agreement protocol with Bell states and single particles
- Multi-party quantum key agreement with five-qubit brown states
- Analyses and improvement of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement
- Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage
- A quantum voting protocol using single-particle states
- Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state
- Semi-quantum key distribution protocols with GHZ states
- Giffen paradoxes in quantum market games
- Quantum authentication with key recycling
- Common entanglement witnesses and their characteristics
- Quantum communication with photon-added coherent states
- Protocols for quantum binary voting
- New scheme for measurement-device-independent quantum key distribution
- Private database queries using one quantum state
- Several foundational and information theoretic implications of Bell's theorem
- Quantum dialogue protocol based on Bell entangled states and single photons
- Quantum identity authentication in the orthogonal-state-encoding QKD system
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
- Novel controlled quantum dialogue protocols without information leakage
- Entanglement of the antisymmetric state
This page was built for publication: Quantum cryptography: public key distribution and coin tossing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477162)