A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Unconditional security in quantum cryptography
Journal of the ACM (JACM)
New bounds in secret-key agreement: the gap between formation and secrecy extraction
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Quantum Information & Computation
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory
The problem of mutually unbiased bases in dimension 6
Cryptography and Communications
Galois automorphisms of a symmetric measurement
Quantum Information & Computation
Systems of imprimitivity for the clifford group
Quantum Information & Computation
Hi-index | 0.00 |
Quantum key distribution protocols based on equiangular spherical codes are introducedand their behavior under the intercept/resend attack investigated. Such protocols offera greater range of secure noise tolerance and speed options than protocols based ontheir cousins, the mutually-unbiased bases, while also enabling the determination of thechannel noise rate without the need to sacrifice key bits. For fixed number of signalstates in a given dimension, the spherical code protocols offer Alice and Bob more noisetolerance at the price of slower key generation rates.