Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
From MaRDI portal
Publication:5143230
DOI10.1088/1367-2630/16/6/063009zbMath1451.81204arXiv1302.4139OpenAlexW2042235351MaRDI QIDQ5143230
Masahito Hayashi, Ryota Nakayama
Publication date: 11 January 2021
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1302.4139
Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Differential phase encoded measurement-device-independent quantum key distribution ⋮ Finite-key security analysis of quantum key distribution with imperfect light sources ⋮ Sifting attacks in finite-size quantum key distribution
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Modeling by shortest data description
- New hash functions and their use in authentication and set equality
- Advances in cryptology - CRYPTO '91. Proceedings of the conference, held in Santa Barbara, CA, USA, August 11-15, 1991
- Secure key rate of the BB84 protocol using finite sample bits
- Duality of privacy amplification against quantum adversaries and data compression with quantum side information
- Unconditional security in quantum cryptography
- NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION
- Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness
- Information Spectrum Approach to Second-Order Coding Rate in Channel Coding
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Channel Coding Rate in the Finite Blocklength Regime
- Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
- Dual Universality of Hash Functions and Its Applications to Quantum Cryptography
- Quantum cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths