Quantum cryptography
From MaRDI portal
Publication:975385
DOI10.1007/S10701-010-9408-4zbMATH Open1190.81033OpenAlexW3192679180MaRDI QIDQ975385FDOQ975385
Publication date: 9 June 2010
Published in: Foundations of Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10701-010-9408-4
Recommendations
quantum cryptographyquantum information theorykey distributionHilbert space formalismsecure cooperation
Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- A Mathematical Theory of Communication
- Probability Inequalities for Sums of Bounded Random Variables
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
- Unconditional security in quantum cryptography
- A Pseudorandom Generator from any One-way Function
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Proof of security of quantum key distribution with two-way classical communications
- Generalized privacy amplification
- Quantum cryptography
- Theory of Cryptography
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- A proof of the security of quantum key distribution (extended abstract)
- Privacy Amplification by Public Discussion
- The Operational Meaning of Min- and Max-Entropy
- Founding Cryptography on Oblivious Transfer – Efficiently
- SECURITY OF QUANTUM KEY DISTRIBUTION
- A new protocol and lower bounds for quantum coin flipping
- Efficient quantum key distribution scheme and a proof of its unconditional security
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
- Dense quantum coding and quantum finite automata
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improving the Security of Quantum Protocols via Commit-and-Open
- Title not available (Why is that?)
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Cryptography in the Bounded-Quantum-Storage Model
- Sampling in a Quantum Population, and Applications
Cited In (21)
- Quantum cryptography: public key distribution and coin tossing
- QUANTUM SECRET ENCRYPTION AND DECRYPTION IN CAVITY QED
- Computational Security of Quantum Encryption
- Quantum-chaotic cryptography
- Title not available (Why is that?)
- Recent progress in quantum cryptography and quantum computation
- Quantum Key Distribution
- A game-theoretic security framework for quantum cryptography: performance analysis and application
- Title not available (Why is that?)
- Cryptography from pseudorandom quantum states
- Quantum cryptography over non-Markovian channels
- Quantum meaningful visual cryptography
- ON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHY
- Efficient Simulation for Quantum Message Authentication
- Verifiable quantum encryption and its practical applications
- A review of quantum and hybrid quantum/classical blockchain protocols
- Quantum cryptography beyond quantum key distribution
- Entropic security in quantum cryptography
- CODES FOR KEY GENERATION IN QUANTUM CRYPTOGRAPHY
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Optimal symmetric ternary quantum encryption schemes
This page was built for publication: Quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q975385)