scientific article
From MaRDI portal
Publication:3522485
zbMath1213.81076arXivquant-ph/0212066MaRDI QIDQ3522485
Norbert Lütkenhaus, Hoi-Kwong Lo, Daniel Gottesman, John Preskill
Publication date: 3 September 2008
Full work available at URL: https://arxiv.org/abs/quant-ph/0212066
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (68)
Measurement-device-independent quantum key distribution with q-plate ⋮ An enhanced proposal on decoy-state measurement device-independent quantum key distribution ⋮ Study on the security of the authentication scheme with key recycling in QKD ⋮ Measurement device-independent quantum key distribution with heralded pair coherent state ⋮ Improved fake-state attack to the quantum key distribution systems ⋮ Recent advances in room temperature single-photon emitters ⋮ Asymptotically optimal prepare-measure quantum key distribution protocol ⋮ Simple analysis of security of the BB84 quantum key distribution protocol ⋮ Efficient quantum key distribution protocol based on classical-quantum polarized channels ⋮ Decoy-state round-robin differential-phase-shift quantum key distribution with source errors ⋮ Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line ⋮ The feasible hyper-encoding measurement-device-independent deterministic secure quantum communication protocol ⋮ Quantum key distribution system against the probabilistic faint after-gate attack ⋮ Performance of passive decoy-state quantum key distribution with mismatched local detectors ⋮ Improved multiparty quantum private comparison based on quantum homomorphic encryption ⋮ The phase matching quantum key distribution protocol with 3-state systems ⋮ Multiple-pulse phase-matching quantum key distribution ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ An improved QKD protocol without public announcement basis using periodically derived basis ⋮ Semi-quantum designated verifier signature scheme ⋮ Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations ⋮ An improved proposal on the practical quantum key distribution with biased basis ⋮ Security analysis of measurement-device-independent quantum key distribution in collective-rotation noisy environment ⋮ Security analysis of an untrusted source for quantum key distribution: passive approach ⋮ Asymmetric ``4+2 protocol for quantum key distribution with finite resources ⋮ Long term confidentiality: a survey ⋮ Finite-key security analysis of quantum key distribution with imperfect light sources ⋮ The black paper of quantum cryptography: real implementation problems ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Key-leakage evaluation of authentication in quantum key distribution with finite resources ⋮ A comprehensive design and performance analysis of low Earth orbit satellite quantum communication ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ Decoy state quantum key distribution with finite resources ⋮ Discrete-phase-randomized coherent state source and its application in quantum key distribution ⋮ Loss-tolerant measurement-device-independent quantum random number generation ⋮ Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency ⋮ Real-time selection for free-space measurement device independent quantum key distribution ⋮ Triggering parametric-down conversion-based quantum key distribution via radiation field ⋮ Analysis of atmospheric effects on satellite-based quantum communication: a comparative study ⋮ Practical covert quantum key distribution with decoy-state method ⋮ Efficient decoding scheme of non-uniform concatenation quantum code with deep neural network ⋮ Multi-party quantum key distribution protocol with new Bell states encoding mode ⋮ Measurement-device-independent quantum key distribution with multiple crystal heralded source with post-selection ⋮ The statistical fluctuation study of quantum key distribution in means of uncertainty principle ⋮ Security of BB84 with weak randomness and imperfect qubit encoding ⋮ New scheme for measurement-device-independent quantum key distribution ⋮ High-dimensional circular quantum secret sharing using orbital angular momentum ⋮ Two-party quantum key agreement protocols under collective noise channel ⋮ Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution ⋮ Reference-frame-independent measurement-device-independent quantum key distribution using hybrid logical basis ⋮ Side channel passive quantum key distribution with one uninformative state ⋮ A universal coherent source for quantum key distribution ⋮ Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations ⋮ A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes ⋮ Passive Decoy State Quantum Key Distribution ⋮ The Case for Quantum Key Distribution ⋮ Verification of Quantum Protocols with a Probabilistic Model-Checker ⋮ Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect ⋮ Decoy-state quantum key distribution with a leaky source ⋮ Multi-partite squash operation and its application to device-independent quantum key distribution ⋮ Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources ⋮ Analysis of polarization coding for subcarrier multiplexing quantum key distribution ⋮ An improved quantum network communication model based on compressed tensor network states ⋮ Measurement device-independent quantum secure direct communication with user authentication ⋮ Performance influence on reference-frame-independent quantum key distributions with detection imperfections ⋮ Individual attacks with generalized discrimination and inadequacy of some information measures ⋮ Modeling and simulation of practical quantum secure communication network ⋮ Multiparty blind quantum computation protocol with deterministic mutual identity authentication
This page was built for publication: