Using quantum key distribution for cryptographic purposes: a survey
From MaRDI portal
Publication:477173
DOI10.1016/J.TCS.2014.09.018zbMATH Open1306.81029OpenAlexW2001527002WikidataQ59183910 ScholiaQ59183910MaRDI QIDQ477173FDOQ477173
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.09.018
Recommendations
Cites Work
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Unconditional security in quantum cryptography
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Security of quantum key distribution with imperfect devices
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- New directions in cryptography
- Title not available (Why is that?)
- On the Power of Quantum Computation
- Strengths and Weaknesses of Quantum Computing
- Quantum cryptography without Bell’s theorem
- Generalized privacy amplification
- Title not available (Why is that?)
- Title not available (Why is that?)
- Quantum cryptography
- A proof of the security of quantum key distribution (extended abstract)
- From Bell’s Theorem to Secure Quantum Key Distribution
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Broadcast channels with confidential messages
- Quantum Cryptography and Secret-Key Distillation
- Biclique Cryptanalysis of the Full AES
- Quantum Computation and Lattice Problems
- Perfectly secure message transmission
- Fakes states, attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocol
- Secret key agreement by public discussion from common information
- Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
- Wire-Tap Channel II
- Cascade ciphers: The importance of being first
- Title not available (Why is that?)
- Title not available (Why is that?)
- New lattice based cryptographic constructions
- Security proof of quantum key distribution with detection efficiency mismatch
- On Unconditionally Secure Robust Distributed Key Distribution Centers
- Quantum relays for long distance quantum cryptography
- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
- SOFSEM 2005: Theory and Practice of Computer Science
Cited In (14)
- Complex quantum networks: a topical review
- Computational Security of Quantum Encryption
- Recovery from an eavesdropping attack on a qubit of a graph state
- The Case for Quantum Key Distribution
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- The security analysis and improvement of some novel quantum proxy signature schemes
- Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit
- Quantum Cryptography: Key Distribution and Beyond
- The black paper of quantum cryptography: real implementation problems
- Quantum cryptography beyond quantum key distribution
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Measurement device-independent quantum dialogue
- Implementation of quantum key distribution network simulation module in the network simulator NS-3
- Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad
Uses Software
This page was built for publication: Using quantum key distribution for cryptographic purposes: a survey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477173)