Security Bounds for Quantum Cryptography with Finite Resources

Type: Book-Chapter

Publication Date: 2008-01-01

Citations: 44

DOI: https://doi.org/10.1007/978-3-540-89304-2_8

Locations

  • Lecture notes in computer science - View
  • arXiv (Cornell University) - View - PDF

Similar Works

Action Title Year Authors
+ PDF Chat Computational Security of Quantum Encryption 2016 Gorjan Alagic
Anne Broadbent
Bill Fefferman
Tommaso Gagliardoni
Christian Schaffner
Michael St. Jules
+ PDF Chat Composable and Finite Computational Security of Quantum Message Transmission 2019 Fabio Banfi
Ueli Maurer
Christopher Portmann
Jiamin Zhu
+ PDF Chat Asymptotic security analysis of teleportation-based quantum cryptography 2020 Diogo Lima
Gustavo Rigolin
+ Finite-key analysis for practical implementations of quantum key distribution 2009 Valerio Scarani
+ PDF Chat Entropic security in quantum cryptography 2009 Simon Pierre Desrosiers
+ Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems 2016 Poompong Chaiwongkhot
+ Quantum Cryptography: from Theory to Practice 2007 Hoi‐Kwong Lo
Norbert Lütkenhaus
+ PDF Chat A Quantum Goldreich-Levin Theorem with Cryptographic Applications 2002 Mark Adcock
Richard Cleve
+ Quantum Cryptography 2021 Peter P. Rohde
+ Quantum Cryptography 2021 Peter P. Rohde
+ Unconditional security of practical quantum key distribution 2007 Hitoshi Inamori
Norbert Lütkenhaus
Dominic Mayers
+ PDF Chat Quantum cryptography over non-Markovian channels 2017 Kishore Thapliyal
Anirban Pathak
Subhashish Banerjee
+ PDF Chat A Note on Quantum Security for Post-Quantum Cryptography 2014 Fang Song
+ PDF Chat Unforgeable Quantum Encryption 2018 Gorjan Alagic
Tommaso Gagliardoni
Christian Majenz
+ Attacks on Quantum Cryptography 2021 Peter P. Rohde
+ PDF Chat Quantum Homomorphic Encryption for Polynomial-Sized Circuits 2016 Yfke Dulek
Christian Schaffner
Florian Speelman
+ PDF Chat Secure quantum key distribution 2014 Hoi‐Kwong Lo
Marcos Curty
Kiyoshi Tamaki
+ PDF Chat New Security Notions and Feasibility Results for Authentication of Quantum Data 2017 Sumegha Garg
Henry Yuen
Mark Zhandry
+ Post-quantum Cryptography and Quantum Proofs 2020
+ Quantum Computational Supremacy: Security and Vulnerability in a New Paradigm 2018 Deborah Brennan

Works That Cite This (30)

Action Title Year Authors
+ PDF Chat A quantum access network 2013 B. Fröhlich
J. F. Dynes
Marco Lucamarini
A. W. Sharpe
Zhiliang Yuan
A. J. Shields
+ PDF Chat Quantum Communication Using Semiconductor Quantum Dots 2022 Daniel A. Vajner
Lucas Rickert
Timm Gao
Koray Kaymazlar
Tobias Heindel
+ Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing 2011 Geir Ove Myhr
+ PDF Chat Security of device-independent quantum key distribution protocols: a review 2023 Ignatius William Primaatmaja
Koon Tong Goh
Ernest Y.-Z. Tan
John T.-F. Khoo
Shouvik Ghorai
Charles Ci Wen Lim
+ PDF Chat Universally composable and customizable post-processing for practical quantum key distribution 2010 Xiongfeng Ma
Chi‐Hang Fred Fung
Jean-Christian Boileau
H. F. Chau
+ PDF Chat Device-Independent Quantum Information Processing 2020 Rotem Arnon-Friedman
+ PDF Chat Analysis of satellite-to-ground quantum key distribution with adaptive optics 2024 Valentina Marulanda Acosta
Daniele Dequal
Matteo Schiavon
Aurélie Montmerle-Bonnefois
Caroline B. Lim
Jean-Marc Conan
Eleni Diamanti
+ PDF Chat Quantum key distribution with finite resources: Secret key rates via Rényi entropies 2011 Silvestre Abruzzo
Hermann Kampermann
Markus Mertz
Dagmar Bruß
+ PDF Chat Security of plug-and-play QKD arrangements with finite resources 2013 Pedro J. Salas
+ PDF Chat de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography 2009 Renato Renner
J. I. Cirac