Quantum Cryptography: Key Distribution and Beyond
From MaRDI portal
Publication:5134949
DOI10.12743/quanta.v6i1.57zbMath1446.81018arXiv1802.05517OpenAlexW3099819669MaRDI QIDQ5134949
Akshata Shenoy-Hejamadi, Srikanth Radhakrishna, Anirban Pathak
Publication date: 18 November 2020
Published in: Quanta (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1802.05517
Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94) Entanglement measures, concurrencies, separability criteria (81P42)
Related Items
Semi-quantum cryptography ⋮ Continuous variable direct secure quantum communication using Gaussian states ⋮ Ping-pong quantum key distribution with trusted noise: non-Markovian advantage ⋮ Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states ⋮ Analysis of a high-dimensional extended B92 protocol ⋮ Quantum and semi-quantum lottery: strategies and advantages ⋮ Is Schrödinger's Cat Alive? ⋮ Analysis of atmospheric effects on satellite-based quantum communication: a comparative study ⋮ Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol ⋮ Decoherence can help quantum cryptographic security ⋮ Multi-party quantum key agreement protocol for smart home environment ⋮ Semiquantum secure direct communication with authentication based on single-photons ⋮ Semi-quantum secure direct communication in the curved spacetime ⋮ Hide and seek with quantum resources: new and modified protocols for quantum steganography
Uses Software
Cites Work
- Theory of Cryptography
- On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments
- Semi device independence of the BB84 protocol
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated semi-quantum direct communication protocols using Bell states
- An efficient quantum scheme for private set intersection
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Distributing secret keys with quantum continuous variables: principle, security and implementations
- Quantum cryptography: public key distribution and coin tossing
- The black paper of quantum cryptography: real implementation problems
- Using quantum key distribution for cryptographic purposes: a survey
- Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits
- Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique
- Protocols of quantum key agreement solely using Bell states and Bell measurement
- Semiquantum key distribution without invoking the classical party's measurement capability
- Characterizing quantum theory in terms of information-theoretic constraints
- An integrated hierarchical dynamic quantum secret sharing protocol
- A proof of the security of quantum key distribution
- Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line
- Extracting randomness: A survey and new constructions
- Quantum cryptography over non-Markovian channels
- Asymmetric quantum dialogue in noisy environment
- Efficient post-quantum undeniable signature on 64-bit ARM
- Quantum English auctions
- Security of practical time-reversed EPR quantum key distribution
- A new protocol and lower bounds for quantum coin flipping
- Semi-quantum information splitting using GHZ-type states
- An inter-bank e-payment protocol based on quantum proxy blind signature
- A no-summoning theorem in relativistic quantum theory
- Hierarchical quantum communication
- Private database queries using one quantum state
- Quantum private information retrieval has linear communication complexity
- Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches
- Quantum dialogue
- A short impossibility proof of quantum bit commitment
- A three-stage quantum cryptography protocol
- Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles
- Counterfactual computation
- A Decade of Lattice Cryptography
- BEYOND THE GOLDENBERG–VAIDMAN PROTOCOL: SECURE AND EFFICIENT QUANTUM COMMUNICATION USING ARBITRARY, ORTHOGONAL, MULTI-PARTICLE QUANTUM STATES
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Semiquantum key distribution
- A Note on Quantum Security for Post-Quantum Cryptography
- Full Security of Quantum Key Distribution From No-Signaling Constraints
- Summoning information in spacetime, or where and when can a qubit be?
- Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
- Tight Bounds for Classical and Quantum Coin Flipping
- Quantum Computation and Quantum Information
- Quantum key distribution based on orthogonal states allows secure quantum bit commitment
- Quantum Private Queries
- Testing the Dimension of Hilbert Spaces
- Quantum Key Distribution with Classical Bob
- Steering, Entanglement, Nonlocality, and the Einstein-Podolsky-Rosen Paradox
- From Bell’s Theorem to Secure Quantum Key Distribution
- Private information retrieval
- Quantum bit escrow
- Unconditional security in quantum cryptography
- Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
- Weak Coin Flipping in a Device-Independent Setting
- Long Distance Quantum Key Distribution with Continuous Variables
- Why haven't more quantum algorithms been found?
- Counterfactuality of ‘counterfactual’ communication
- Deterministic relativistic quantum bit commitment
- Attacking and Defending the McEliece Cryptosystem
- Monogamy of non-local quantum correlations
- Efficient Device-Independent Quantum Key Distribution
- Universally Composable Quantum Multi-party Computation
- Composing Quantum Protocols in a Classical Environment
- Practical Cryptanalysis of SFLASH
- Introduction to post-quantum cryptography
- Lattice-based Cryptography
- Reducing Key Length of the McEliece Cryptosystem
- Coin flipping by telephone a protocol for solving impossible problems
- Broadcast channels with confidential messages
- Quantum algorithms and the Fourier transform
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Quantum key distribution using multilevel encoding: security analysis
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum Cryptography Based on Orthogonal States
- On the origin of nonclassicality in single systems
- Comment on ‘Two-state vector formalism and quantum interference’
- Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
- Quantum Bit Commitment with a Composite Evidence
- Quantum secret sharing with classical Bobs
- Counterfactual Quantum Deterministic Key Distribution
- Driving the Bloch vector of a single molecule: towards a triggered single photon source
- Optimal Quantum Strong Coin Flipping
- Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
- Quantum Private Queries: Security Analysis
- Quantum secret sharing
- Experimental quantum teleportation
- Mixed-state entanglement and quantum error correction
- Proposed Experiment to Test Local Hidden-Variable Theories
- Quantum cryptography
- Security Bounds for Quantum Cryptography with Finite Resources