Two-way unclonable encryption with a vulnerable sender
From MaRDI portal
Publication:5074431
DOI10.1142/S0219749921500374zbMath1495.81039arXiv2010.10827OpenAlexW4214938225WikidataQ120964186 ScholiaQ120964186MaRDI QIDQ5074431
Publication date: 9 May 2022
Published in: International Journal of Quantum Information (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2010.10827
Quantum state estimation, approximate cloning (81P50) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Quantum channels, fidelity (81P47)
Cites Work
- Unnamed Item
- Unnamed Item
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- Efficient quantum key distribution scheme and a proof of its unconditional security
- New hash functions and their use in authentication and set equality
- Optimal attacks on qubit-based quantum key recycling
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Correcting errors without leaking partial information
- Fast computation of GCDs
- Quantum Authentication and Encryption with Key Recycling
- Leftover Hashing Against Quantum Side Information
- A Quantum Cipher with Near Optimal Key-Recycling
- Theory of Cryptography
This page was built for publication: Two-way unclonable encryption with a vulnerable sender