scientific article

From MaRDI portal
Publication:3522485

zbMath1213.81076arXivquant-ph/0212066MaRDI QIDQ3522485

Norbert Lütkenhaus, Hoi-Kwong Lo, Daniel Gottesman, John Preskill

Publication date: 3 September 2008

Full work available at URL: https://arxiv.org/abs/quant-ph/0212066

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

Measurement-device-independent quantum key distribution with q-plateAn enhanced proposal on decoy-state measurement device-independent quantum key distributionStudy on the security of the authentication scheme with key recycling in QKDMeasurement device-independent quantum key distribution with heralded pair coherent stateImproved fake-state attack to the quantum key distribution systemsRecent advances in room temperature single-photon emittersAsymptotically optimal prepare-measure quantum key distribution protocolSimple analysis of security of the BB84 quantum key distribution protocolEfficient quantum key distribution protocol based on classical-quantum polarized channelsDecoy-state round-robin differential-phase-shift quantum key distribution with source errorsTwo-way deterministic quantum key distribution against passive detector side channel attacks in the forward lineThe feasible hyper-encoding measurement-device-independent deterministic secure quantum communication protocolQuantum key distribution system against the probabilistic faint after-gate attackPerformance of passive decoy-state quantum key distribution with mismatched local detectorsImproved multiparty quantum private comparison based on quantum homomorphic encryptionThe phase matching quantum key distribution protocol with 3-state systemsMultiple-pulse phase-matching quantum key distributionDifferential phase encoded measurement-device-independent quantum key distributionAn improved QKD protocol without public announcement basis using periodically derived basisSemi-quantum designated verifier signature schemeParameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuationsAn improved proposal on the practical quantum key distribution with biased basisSecurity analysis of measurement-device-independent quantum key distribution in collective-rotation noisy environmentSecurity analysis of an untrusted source for quantum key distribution: passive approachAsymmetric ``4+2 protocol for quantum key distribution with finite resourcesLong term confidentiality: a surveyFinite-key security analysis of quantum key distribution with imperfect light sourcesThe black paper of quantum cryptography: real implementation problemsUsing quantum key distribution for cryptographic purposes: a surveyKey-leakage evaluation of authentication in quantum key distribution with finite resourcesA comprehensive design and performance analysis of low Earth orbit satellite quantum communicationSecurity analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengthsDecoy state quantum key distribution with finite resourcesDiscrete-phase-randomized coherent state source and its application in quantum key distributionLoss-tolerant measurement-device-independent quantum random number generationAnalysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiencyReal-time selection for free-space measurement device independent quantum key distributionTriggering parametric-down conversion-based quantum key distribution via radiation fieldAnalysis of atmospheric effects on satellite-based quantum communication: a comparative studyPractical covert quantum key distribution with decoy-state methodEfficient decoding scheme of non-uniform concatenation quantum code with deep neural networkMulti-party quantum key distribution protocol with new Bell states encoding modeMeasurement-device-independent quantum key distribution with multiple crystal heralded source with post-selectionThe statistical fluctuation study of quantum key distribution in means of uncertainty principleSecurity of BB84 with weak randomness and imperfect qubit encodingNew scheme for measurement-device-independent quantum key distributionHigh-dimensional circular quantum secret sharing using orbital angular momentumTwo-party quantum key agreement protocols under collective noise channelImproved statistical fluctuation analysis for measurement-device-independent quantum key distributionReference-frame-independent measurement-device-independent quantum key distribution using hybrid logical basisSide channel passive quantum key distribution with one uninformative stateA universal coherent source for quantum key distributionDecoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuationsA hybrid quantum key distribution protocol based on extended unitary operations and fountain codesPassive Decoy State Quantum Key DistributionThe Case for Quantum Key DistributionVerification of Quantum Protocols with a Probabilistic Model-CheckerIntercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effectDecoy-state quantum key distribution with a leaky sourceMulti-partite squash operation and its application to device-independent quantum key distributionPractical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sourcesAnalysis of polarization coding for subcarrier multiplexing quantum key distributionAn improved quantum network communication model based on compressed tensor network statesMeasurement device-independent quantum secure direct communication with user authenticationPerformance influence on reference-frame-independent quantum key distributions with detection imperfectionsIndividual attacks with generalized discrimination and inadequacy of some information measuresModeling and simulation of practical quantum secure communication networkMultiparty blind quantum computation protocol with deterministic mutual identity authentication




This page was built for publication: