Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
Security of quantum protocols against coherent measurements
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Equivalence Between Two Flavours of Oblivious Transfers
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Quantum Cryptography over Underground Optical Fibers
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Oblivious transfers and intersecting codes
IEEE Transactions on Information Theory - Part 1
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
PSPACE Has Constant-Round Quantum Interactive Proof Systems
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Completeness theorems with constructive proofs for finite deterministic 2-party functions
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Proof of unconditional security of six-state quatum key distribution scheme
Quantum Information & Computation
Finite-key analysis for quantum key distribution with decoy states
Quantum Information & Computation
Quantum Information & Computation
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
A practical trojan horse for bell-inequality-based quantum cryptography
Quantum Information & Computation
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Some attacks on quantum-based cryptographic protocols
Quantum Information & Computation
Information vs. disturbance in dimension D
Quantum Information & Computation
Getting something out of nothing
Quantum Information & Computation
Multi-partite quantum cryptographic protocols with noisy GHZ States
Quantum Information & Computation
Self testing quantum apparatus
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
The universal composable security of quantum key distribution
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Bipartite coherent-state quantum key distribution with strong reference pulse
Quantum Information Processing
Hi-index | 0.00 |
We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally security of this QKD protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secure against Bob if implemented on top of an unconditionally secure bit commitment scheme. We prove a lemma that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol. This result and the reduction mentioned above implies the unconditional security of our QKD protocol despite our previous proof that unconditionally secure bit commitment schemes are impossible.