Quantum key distribution using a two-way quantum channel
From MaRDI portal
Publication:477172
DOI10.1016/J.TCS.2014.09.017zbMATH Open1306.81033arXiv1004.0157OpenAlexW1838507101WikidataQ62592129 ScholiaQ62592129MaRDI QIDQ477172FDOQ477172
Marco Lucamarini, Stefano Mancini
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Abstract: We review a communication protocol recently proposed by us that makes use of a two-way quantum channel. We provide a characterization of such a protocol from a practical perspective, and consider the most relevant eavesdropping strategies against it. This allows us to compare its potentialities with those of a standard protocol which uses a one-way quantum channel.
Full work available at URL: https://arxiv.org/abs/1004.0157
Recommendations
- A two-step channel-encrypting quantum key distribution protocol
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- Quantum key distribution: from principles to practicalities
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
- Security of a new two-way continuous-variable quantum key distribution protocol
Cites Work
- Quantum cryptography based on Bell’s theorem
- Title not available (Why is that?)
- Experimental quantum cryptography.
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Generalized privacy amplification
- Quantum cryptography
- Privacy Amplification by Public Discussion
- Broadcast channels with confidential messages
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Title not available (Why is that?)
- Blind encoding into qudits
- Deterministic six states protocol for quantum communication
Cited In (9)
- Two Avowable Quantum Communication Schemes
- Checking noise correlations for safer two-way quantum key distribution
- TWO-WAY QUANTUM COMMUNICATION CHANNELS
- Entropic bounds for unitary testers and mutually unbiased unitary bases
- Game-theoretic perspective of Ping-Pong protocol
- Semi-quantum cryptography
- QUANTUM KEY EVOLUTION AND ITS APPLICATIONS
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
This page was built for publication: Quantum key distribution using a two-way quantum channel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477172)