Theory of Cryptography
From MaRDI portal
Publication:5711654
DOI10.1007/b106171zbMath1079.94532arXivquant-ph/0409078OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711654
Michael Ben-Or, Dominic Mayers, Jonathan Oppenheim, Debbie W. Leung, Michał Horodecki
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0409078
Related Items (28)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) ⋮ The Locking-Decoding Frontier for Generic Dynamics ⋮ Study on the security of the authentication scheme with key recycling in QKD ⋮ Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states ⋮ Composable and finite computational security of quantum message transmission ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ Categorical composable cryptography: extended version ⋮ Categorical composable cryptography ⋮ A quantum key distribution on qudits using quantum operators ⋮ Optimizing the decoy-state BB84 QKD protocol parameters ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Finite-key security analysis of quantum key distribution with imperfect light sources ⋮ Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ Discrete-phase-randomized coherent state source and its application in quantum key distribution ⋮ New probabilistic quantum key distribution protocol ⋮ Robustness and device independence of verifiable blind quantum computing ⋮ Asymmetric cyclic controlled quantum teleportation by using nine-qubit entangled state ⋮ Cryptanalysis of multi-user quantum private query protocol ⋮ Everlasting multi-party computation ⋮ Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis ⋮ Controlled probabilistic quantum key distribution using a ground state ⋮ An integrated hierarchical dynamic quantum secret sharing protocol ⋮ Security Bounds for Quantum Cryptography with Finite Resources ⋮ Multi-partite squash operation and its application to device-independent quantum key distribution ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought) ⋮ Quantum private comparison with a malicious third party
This page was built for publication: Theory of Cryptography