Splitting information securely with entanglement
From MaRDI portal
Publication:1887141
DOI10.1016/S0890-5401(03)00121-4zbMath1082.68025MaRDI QIDQ1887141
Publication date: 23 November 2004
Published in: Information and Computation (Search for Journal in Brave)
Data encryption (aspects in computer science) (68P25) Quantum measurement theory, state operations, state preparations (81P15) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Quantum protocols for untrusted computations ⋮ BASIC OPERATIONS AMONG ENTANGLED STATES AND THEIR APPLICATIONS TO QUANTUM PROTOCOLS
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Quantum Entanglement and Communication Complexity
- A proof of the security of quantum key distribution (extended abstract)
- Unconditional security in quantum cryptography
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum secret sharing
- Mixed-state entanglement and quantum error correction
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Splitting information securely with entanglement