Using quantum key distribution for cryptographic purposes: a survey
From MaRDI portal
Publication:477173
DOI10.1016/j.tcs.2014.09.018zbMath1306.81029OpenAlexW2001527002WikidataQ59183910 ScholiaQ59183910MaRDI QIDQ477173
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.09.018
Related Items (12)
The security analysis and improvement of some novel quantum proxy signature schemes ⋮ Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit ⋮ Computational Security of Quantum Encryption ⋮ Measurement device-independent quantum dialogue ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Implementation of quantum key distribution network simulation module in the network simulator NS-3 ⋮ Quantum cryptography beyond quantum key distribution ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ The black paper of quantum cryptography: real implementation problems ⋮ Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad ⋮ The Case for Quantum Key Distribution ⋮ Recovery from an eavesdropping attack on a qubit of a graph state
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- Cascade ciphers: The importance of being first
- Universal classes of hash functions
- Biclique Cryptanalysis of the Full AES
- From Bell’s Theorem to Secure Quantum Key Distribution
- A proof of the security of quantum key distribution (extended abstract)
- Unconditional security in quantum cryptography
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- SECURITY OF QUANTUM KEY DISTRIBUTION
- New lattice based cryptographic constructions
- Communication Theory of Secrecy Systems*
- New directions in cryptography
- Perfectly secure message transmission
- Broadcast channels with confidential messages
- Secret key agreement by public discussion from common information
- On the Power of Quantum Computation
- Strengths and Weaknesses of Quantum Computing
- On Unconditionally Secure Robust Distributed Key Distribution Centers
- Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
- Quantum cryptography without Bell’s theorem
- Quantum Computation and Lattice Problems
- Quantum relays for long distance quantum cryptography
- Generalized privacy amplification
- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search
- Quantum cryptography
- Quantum Cryptography and Secret-Key Distillation
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
- SOFSEM 2005: Theory and Practice of Computer Science
- Wire-Tap Channel II
This page was built for publication: Using quantum key distribution for cryptographic purposes: a survey