Security Bounds for Quantum Cryptography with Finite Resources
From MaRDI portal
Publication:5503299
DOI10.1007/978-3-540-89304-2_8zbMath1162.94399arXiv0806.0120OpenAlexW1599958972MaRDI QIDQ5503299
Valerio Scarani, Renato Renner
Publication date: 13 January 2009
Published in: Theory of Quantum Computation, Communication, and Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0806.0120
Related Items (5)
Quantum cryptography beyond quantum key distribution ⋮ Asymmetric ``4+2 protocol for quantum key distribution with finite resources ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Simple and Tight Device-Independent Security Proofs ⋮ Критерии секретности ключа
Cites Work
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Quantum cryptography based on Bell’s theorem
- Proof of security of quantum key distribution with two-way classical communications
- Proposed Experiment to Test Local Hidden-Variable Theories
- Quantum cryptography
- Distillation of secret key and entanglement from quantum states
- Theory of Cryptography
This page was built for publication: Security Bounds for Quantum Cryptography with Finite Resources