Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
25 years of quantum cryptography
ACM SIGACT News
Computational Complexity of Machine Learning
Computational Complexity of Machine Learning
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Quantum Cryptography with Imperfect Apparatus
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
A new protocol and lower bounds for quantum coin flipping
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Splitting information securely with entanglement
Information and Computation
A new protocol and lower bounds for quantum coin flipping
Journal of Computer and System Sciences - STOC 2001
Communicating quantum processes
Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Tensor norms and the classical communication complexity of nonlocal quantum measurement
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
An introduction to quantum cryptography
Crossroads
Types and typechecking for Communicating Quantum Processes
Mathematical Structures in Computer Science
QMC: A Model Checker for Quantum Systems
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Classical Knowledge for Quantum Cryptographic Reasoning
Electronic Notes in Theoretical Computer Science (ENTCS)
Security Bounds for Quantum Cryptography with Finite Resources
Theory of Quantum Computation, Communication, and Cryptography
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Multi-Agent Systems in Quantum Security for Modern Wireless Networks
KES '09 Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems: Part II
Security of trusted repeater quantum key distribution networks
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Perfectly concealing quantum bit commitment from any quantum one-way permutation
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Towards the world-wide quantum network
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Proceedings of the 3rd international conference on Security of information and networks
Prototype of a quantum cryptography system for the end user
ACS'09 Proceedings of the 9th WSEAS international conference on Applied computer science
Verification of Quantum Protocols with a Probabilistic Model-Checker
Electronic Notes in Theoretical Computer Science (ENTCS)
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
Quantum Information & Computation
Equiangular spherical codes in quantum cryptography
Quantum Information & Computation
Can quantum cryptography imply quantum mechanics?
Quantum Information & Computation
Time-shift attack in practical quantum cryptosystems
Quantum Information & Computation
Quantum Information & Computation
Quantum direct communication with mutual authentication
Quantum Information & Computation
Security proof of quantum key distribution with detection efficiency mismatch
Quantum Information & Computation
Quantum information: a tutorial
UC'11 Proceedings of the 10th international conference on Unconventional computation
A formal approach to unconditional security proofs for quantum key distribution
UC'11 Proceedings of the 10th international conference on Unconventional computation
Classical cryptographic protocols in a quantum world
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
An arbitrated quantum message signature scheme
CIS'04 Proceedings of the First international conference on Computational and Information Science
A logic for formal verification of quantum programs
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
The universal composable security of quantum key distribution
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Exact quantum algorithms for the leader election problem
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
Exact Quantum Algorithms for the Leader Election Problem
ACM Transactions on Computation Theory (TOCT)
Computational indistinguishability between quantum states and its cryptographic application
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Probabilistic quantum key distribution
Quantum Information & Computation
Quantum Information & Computation
Encryption with weakly random keys using a quantum ciphertext
Quantum Information & Computation
On the existence of loss-tolerant quantum oblivious transfer protocols
Quantum Information & Computation
On the security of interferometric quantum key distribution
TPNC'12 Proceedings of the First international conference on Theory and Practice of Natural Computing
Feasibility and completeness of cryptographic tasks in the quantum world
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Attack and improvements of fair quantum blind signature schemes
Quantum Information Processing
Security of plug-and-play QKD arrangements with finite resources
Quantum Information & Computation
Robust device independent quantum key distribution
Proceedings of the 5th conference on Innovations in theoretical computer science
Security of high speed quantum key distribution with finite detector dead time
Quantum Information & Computation
Hi-index | 0.00 |
Basic techniques to prove the unconditional security of quantum crypto graphy are described. They are applied to a quantum key distribution protocol proposed by Bennett and Brassard [1984]. The proof considers a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission. Each individual signal sent into the channel must contain a single photon or any two-dimensional system in the exact state described in the protocol. No restriction is imposed on the detector used at the receiving side of the channel, except that whether or not the received system is detected must be independent of the basis used to measure this system.