Lim et al., 2014 - Google Patents
The error tolerance bound for secure multi-qubit QKD against incoherent attackLim et al., 2014
View PDF- Document ID
- 959227023907765413
- Author
- Lim K
- Ko H
- Kim K
- Suh C
- Rhee J
- Publication year
- Publication venue
- IEEE Journal of Selected Topics in Quantum Electronics
External Links
Snippet
The tolerance bound for quantum symbol error rate in a multi-qubit quantum key distribution system is derived in consideration of an incoherent attack on a single-photon quantum channel, where multi-qubit encoding and measurement can be applied to a single photon in …
- 239000002096 quantum dot 0 title abstract description 109
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pan et al. | Experimental free-space quantum secure direct communication and its security analysis | |
Djordjevic | Physical-layer security and quantum key distribution | |
Fuchs et al. | Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy | |
Lo et al. | Efficient quantum key distribution scheme and a proof of its unconditional security | |
Fung et al. | Practical issues in quantum-key-distribution postprocessing | |
CN113141252B (en) | Quantum key distribution method, quantum communication method, device and system | |
Pan et al. | Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs | |
Niemiec et al. | Management of security in quantum cryptography | |
US20070076871A1 (en) | Quantum key distribution | |
CN111092664B (en) | Channel capacity increasing method for quantum secure communication irrelevant to measuring equipment | |
Tao et al. | Two semi-quantum direct communication protocols with mutual authentication based on bell states | |
Li et al. | Fault-tolerant quantum secure direct communication protocol based on decoherence-free states | |
Tsai et al. | Semi-quantum key distribution robust against combined collective noise | |
Sun et al. | Counterfactual quantum key distribution with high efficiency | |
Li et al. | The Security Analysis of Quantum SAGR04 Protocol in Collective‐Rotation Noise Channel | |
Lim et al. | The error tolerance bound for secure multi-qubit QKD against incoherent attack | |
WO2010011127A2 (en) | Quantum network relay | |
Hayashi | Finite-block-length analysis in classical and quantum information theory | |
Jingzheng et al. | A survey on device-independent quantum communications | |
Kochman et al. | Toward photon-efficient key distribution over optical channels | |
JP2016025550A (en) | Quantum entanglement photon pair generation device and quantum encryption key distribution device | |
Sekga et al. | Reference frame independent twin field quantum key distribution with source flaws | |
Su | A simple relation of guessing probability in quantum key distribution | |
Yan et al. | Quantum key distribution using four-level particles | |
Graifer et al. | Quantum key distribution with state replacement |