Sifting attacks in finite-size quantum key distribution
From MaRDI portal
Publication:5855042
DOI10.1088/1367-2630/18/5/053001zbMath1456.81160arXiv1506.07502OpenAlexW1811937173MaRDI QIDQ5855042
Corsin Pfister, Patrick J. Coles, Norbert Lütkenhaus, Stephanie Wehner
Publication date: 12 March 2021
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1506.07502
Related Items (1)
Cites Work
- Efficient quantum key distribution scheme and a proof of its unconditional security
- The tail of the hypergeometric distribution
- Probability inequalities for the sum in sampling without replacement
- Concentration Inequalities
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
- Probability Inequalities for Sums of Bounded Random Variables
This page was built for publication: Sifting attacks in finite-size quantum key distribution