Quantum key distribution using a two-way quantum channel
From MaRDI portal
Publication:477172
DOI10.1016/J.TCS.2014.09.017zbMATH Open1306.81033arXiv1004.0157OpenAlexW1838507101WikidataQ62592129 ScholiaQ62592129MaRDI QIDQ477172FDOQ477172
Authors: Marco Lucamarini, Stefano Mancini
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Abstract: We review a communication protocol recently proposed by us that makes use of a two-way quantum channel. We provide a characterization of such a protocol from a practical perspective, and consider the most relevant eavesdropping strategies against it. This allows us to compare its potentialities with those of a standard protocol which uses a one-way quantum channel.
Full work available at URL: https://arxiv.org/abs/1004.0157
Recommendations
- A two-step channel-encrypting quantum key distribution protocol
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- Quantum key distribution: from principles to practicalities
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
- Security of a new two-way continuous-variable quantum key distribution protocol
Cites Work
- Quantum cryptography based on Bell’s theorem
- Title not available (Why is that?)
- Experimental quantum cryptography.
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Generalized privacy amplification
- Quantum cryptography
- Privacy Amplification by Public Discussion
- Broadcast channels with confidential messages
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Deterministic quantum distribution of a \(d\)-ary key
- Blind encoding into qudits
- Deterministic six states protocol for quantum communication
Cited In (20)
- Weak + Vacuum and one decoy states with two way quantum key distribution protocol
- Nonorthogonal unitaries in two-way quantum key distribution
- Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line
- Two Avowable Quantum Communication Schemes
- On the information-splitting essence of two types of quantum key distribution protocols
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- A two-step channel-encrypting quantum key distribution protocol
- Checking noise correlations for safer two-way quantum key distribution
- Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs
- TWO-WAY QUANTUM COMMUNICATION CHANNELS
- Entropic bounds for unitary testers and mutually unbiased unitary bases
- Two-layer quantum key distribution
- Game-theoretic perspective of Ping-Pong protocol
- Semi-quantum cryptography
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- A two-dimensional quantum key distribution protocol based on polarization-phase encoding
- One-way protocol for two-bit intrinsic random key distribution with entangled photon pairs
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
- Quantum key evolution and its applications
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
This page was built for publication: Quantum key distribution using a two-way quantum channel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477172)