Decoy-state quantum key distribution with a leaky source
From MaRDI portal
Publication:5855055
DOI10.1088/1367-2630/18/6/065008zbMath1456.81161arXiv1803.06045OpenAlexW3099750387WikidataQ62592114 ScholiaQ62592114MaRDI QIDQ5855055
Marcos Curty, Marco Lucamarini, Kiyoshi Tamaki
Publication date: 12 March 2021
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1803.06045
Quantum cryptography (quantum-theoretic aspects) (81P94) Computational stability and error-correcting codes for quantum computation and communication processing (81P73)
Related Items (1)
Cites Work
- Linear programming. Foundations and extensions.
- Weighted sums of certain dependent random variables
- Security analysis of an untrusted source for quantum key distribution: passive approach
- Communication Theory of Secrecy Systems*
- Quantum cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Decoy-state quantum key distribution with a leaky source