Theory of Cryptography

From MaRDI portal
Publication:5711654

DOI10.1007/b106171zbMath1079.94532arXivquant-ph/0409078OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711654

Michael Ben-Or, Dominic Mayers, Jonathan Oppenheim, Debbie W. Leung, Michał Horodecki

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0409078




Related Items (28)

Attacks on quantum key distribution protocols that employ non-ITS authenticationHow to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)The Locking-Decoding Frontier for Generic DynamicsStudy on the security of the authentication scheme with key recycling in QKDTrojan horse attack free fault-tolerant quantum key distribution protocols using GHZ statesComposable and finite computational security of quantum message transmissionDifferential phase encoded measurement-device-independent quantum key distributionCategorical composable cryptography: extended versionCategorical composable cryptographyA quantum key distribution on qudits using quantum operatorsOptimizing the decoy-state BB84 QKD protocol parametersQuantum Cryptography: Key Distribution and BeyondFinite-key security analysis of quantum key distribution with imperfect light sourcesConcise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengthsSecurity analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengthsDiscrete-phase-randomized coherent state source and its application in quantum key distributionNew probabilistic quantum key distribution protocolRobustness and device independence of verifiable blind quantum computingAsymmetric cyclic controlled quantum teleportation by using nine-qubit entangled stateCryptanalysis of multi-user quantum private query protocolEverlasting multi-party computationComposable security against collective attacks of a modified BB84 QKD protocol with information only in one basisControlled probabilistic quantum key distribution using a ground stateAn integrated hierarchical dynamic quantum secret sharing protocolSecurity Bounds for Quantum Cryptography with Finite ResourcesMulti-partite squash operation and its application to device-independent quantum key distributionQuantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)Quantum private comparison with a malicious third party




This page was built for publication: Theory of Cryptography