+

Lim et al., 2014 - Google Patents

The error tolerance bound for secure multi-qubit QKD against incoherent attack

Lim et al., 2014

View PDF
Document ID
959227023907765413
Author
Lim K
Ko H
Kim K
Suh C
Rhee J
Publication year
Publication venue
IEEE Journal of Selected Topics in Quantum Electronics

External Links

Snippet

The tolerance bound for quantum symbol error rate in a multi-qubit quantum key distribution system is derived in consideration of an incoherent attack on a single-photon quantum channel, where multi-qubit encoding and measurement can be applied to a single photon in …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths

Similar Documents

Publication Publication Date Title
Pan et al. Experimental free-space quantum secure direct communication and its security analysis
Djordjevic Physical-layer security and quantum key distribution
Fuchs et al. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
Lo et al. Efficient quantum key distribution scheme and a proof of its unconditional security
Fung et al. Practical issues in quantum-key-distribution postprocessing
CN113141252B (en) Quantum key distribution method, quantum communication method, device and system
Pan et al. Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs
Niemiec et al. Management of security in quantum cryptography
US20070076871A1 (en) Quantum key distribution
CN111092664B (en) Channel capacity increasing method for quantum secure communication irrelevant to measuring equipment
Tao et al. Two semi-quantum direct communication protocols with mutual authentication based on bell states
Li et al. Fault-tolerant quantum secure direct communication protocol based on decoherence-free states
Tsai et al. Semi-quantum key distribution robust against combined collective noise
Sun et al. Counterfactual quantum key distribution with high efficiency
Li et al. The Security Analysis of Quantum SAGR04 Protocol in Collective‐Rotation Noise Channel
Lim et al. The error tolerance bound for secure multi-qubit QKD against incoherent attack
WO2010011127A2 (en) Quantum network relay
Hayashi Finite-block-length analysis in classical and quantum information theory
Jingzheng et al. A survey on device-independent quantum communications
Kochman et al. Toward photon-efficient key distribution over optical channels
JP2016025550A (en) Quantum entanglement photon pair generation device and quantum encryption key distribution device
Sekga et al. Reference frame independent twin field quantum key distribution with source flaws
Su A simple relation of guessing probability in quantum key distribution
Yan et al. Quantum key distribution using four-level particles
Graifer et al. Quantum key distribution with state replacement
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载