Quantum key distribution using a two-way quantum channel
From MaRDI portal
Abstract: We review a communication protocol recently proposed by us that makes use of a two-way quantum channel. We provide a characterization of such a protocol from a practical perspective, and consider the most relevant eavesdropping strategies against it. This allows us to compare its potentialities with those of a standard protocol which uses a one-way quantum channel.
Recommendations
- A two-step channel-encrypting quantum key distribution protocol
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- Quantum key distribution: from principles to practicalities
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
- Security of a new two-way continuous-variable quantum key distribution protocol
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- Blind encoding into qudits
- Broadcast channels with confidential messages
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Deterministic quantum distribution of a \(d\)-ary key
- Deterministic six states protocol for quantum communication
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Experimental quantum cryptography.
- Generalized privacy amplification
- Privacy Amplification by Public Discussion
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
Cited in
(20)- Weak + Vacuum and one decoy states with two way quantum key distribution protocol
- Two Avowable Quantum Communication Schemes
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs
- Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line
- A two-dimensional quantum key distribution protocol based on polarization-phase encoding
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- Nonorthogonal unitaries in two-way quantum key distribution
- TWO-WAY QUANTUM COMMUNICATION CHANNELS
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
- Quantum key evolution and its applications
- One-way protocol for two-bit intrinsic random key distribution with entangled photon pairs
- A two-step channel-encrypting quantum key distribution protocol
- Entropic bounds for unitary testers and mutually unbiased unitary bases
- Semi-quantum cryptography
- On the information-splitting essence of two types of quantum key distribution protocols
- Checking noise correlations for safer two-way quantum key distribution
- Two-layer quantum key distribution
- Game-theoretic perspective of Ping-Pong protocol
This page was built for publication: Quantum key distribution using a two-way quantum channel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477172)