Quantum Authentication and Encryption with Key Recycling
From MaRDI portal
Publication:5270366
DOI10.1007/978-3-319-56617-7_11zbMath1415.94429OpenAlexW2534327730MaRDI QIDQ5270366
Publication date: 23 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56617-7_11
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (7)
Two-way unclonable encryption with a vulnerable sender ⋮ Block encryption of quantum messages ⋮ Quantum key distribution scheme with key recycling in integrated optical network ⋮ Unnamed Item ⋮ Optimal attacks on qubit-based quantum key recycling ⋮ Quantum Authentication with Key Recycling ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)
Cites Work
- Unnamed Item
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)
- Quantum cryptography: public key distribution and coin tossing
- New security notions and feasibility results for authentication of quantum data
- Randomness is linear in space
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Correcting errors without leaking partial information
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games
- Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
- The Operational Meaning of Min- and Max-Entropy
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- A Quantum Cipher with Near Optimal Key-Recycling
This page was built for publication: Quantum Authentication and Encryption with Key Recycling