A practical protocol for three-party authenticated quantum key distribution
From MaRDI portal
Publication:488178
DOI10.1007/s11128-014-0767-1zbMath1305.81063OpenAlexW2063077266MaRDI QIDQ488178
Publication date: 23 January 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0767-1
quantum cryptographyprovable securityquantum key distributionstandard problem reductionthree-party key distribution protocol
Related Items
An efficient quantum scheme for private set intersection ⋮ Comment on A practical protocol for three-party authenticated quantum key distribution ⋮ Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting ⋮ An efficient quantum identity authentication key agreement protocol without entanglement ⋮ A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states ⋮ A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks ⋮ A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- A proof of the security of quantum key distribution
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Quantum cryptography without public announcement of bases
- Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
- Security of quantum key distribution against all collective attacks
- Experimental quantum cryptography.
- The random oracle methodology, revisited
- Unconditional security in quantum cryptography
- UNITARY OPERATOR BASES
- On the Power of Two-Party Quantum Cryptography
- Privacy Amplification by Public Discussion
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Error Correcting Codes in Quantum Theory
- Generalized privacy amplification
- QUANTUM KEY EVOLUTION AND ITS APPLICATIONS
- Quantum cryptography
- Theory of Cryptography
- Theory of Cryptography