Security of a single-state semi-quantum key distribution protocol
暂无分享,去创建一个
Wei Zhang | Paulo Mateus | Daowen Qiu | Wei Zhang | Daowen Qiu | P. Mateus
[1] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[2] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.
[3] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[4] Chun-Wei Yang,et al. Authenticated semi-quantum key distribution protocol using Bell states , 2014, Quantum Inf. Process..
[5] Shengyu Zhang,et al. Semiquantum key distribution without invoking the classical party’s measurement capability , 2015, Quantum Inf. Process..
[6] Takayuki Miyadera. RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE , 2011 .
[7] R. Renner,et al. A Generic Security Proof for Quantum Key Distribution , 2004, quant-ph/0402131.
[8] Quan Zhang,et al. Semiquantum Key Distribution Using Entangled States , 2011, 1104.1267.
[9] Walter O. Krawec. Security of a semi-quantum protocol where reflections contribute to the secret key , 2015, Quantum Inf. Process..
[10] Mark M. Wilde,et al. From Classical to Quantum Shannon Theory , 2011, ArXiv.
[11] Shun Watanabe,et al. Tomography increases key rates of quantum-key-distribution protocols , 2008, 0802.2419.
[12] Hua Lu,et al. QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE , 2008 .
[13] Shengyu Zhang,et al. Semiquantum key distribution with secure delegated quantum computation , 2015, Scientific Reports.
[14] Tan Yong-Gang,et al. Quantum key distribution series network protocol with M-classical Bobs , 2009 .
[15] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[16] R. Renner,et al. A de Finetti representation for finite symmetric quantum states , 2004, quant-ph/0410229.
[17] Simon J. D. Phoenix,et al. Eavesdropping Strategies and Rejected-data Protocols in Quantum Cryptography , 1993 .
[18] Shun Watanabe,et al. Narrow basis angle doubles secret key in the BB84 protocol , 2010 .
[19] Chitra Shukla,et al. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue , 2017, Quantum Inf. Process..
[20] Walter O. Krawec. Mediated semiquantum key distribution , 2014, 1411.6024.
[21] B Kraus,et al. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.
[22] Walter O. Krawec. An improved asymptotic key rate bound for a mediated semi-quantum key distribution protocol , 2015, Quantum Inf. Comput..
[23] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[24] Tal Mor,et al. Quantum Key Distribution with Classical Bob , 2007, ICQNM.
[25] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[26] Nicolas Gisin,et al. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .
[27] Walter O. Krawec. Quantum key distribution with mismatched measurements over arbitrary channels , 2016, Quantum Inf. Comput..
[28] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[29] R. Renner,et al. An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.
[30] Daowen Qiu,et al. Semiquantum-key distribution using less than four quantum states , 2009 .
[31] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[32] Walter O. Krawec. Security proof of a semi-quantum key distribution protocol , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).
[33] Shun Watanabe,et al. Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[34] Hoi-Kwong Lo,et al. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry , 2006 .
[35] Zhiwei Sun,et al. QUANTUM KEY DISTRIBUTION WITH LIMITED CLASSICAL BOB , 2011, 1106.4615.
[36] Ryutaroh Matsumoto,et al. Improved asymptotic key rate of the B92 protocol , 2013, 2013 IEEE International Symposium on Information Theory.
[37] Walter O. Krawec. Restricted attacks on semi-quantum key distribution protocols , 2014, Quantum Inf. Process..
[38] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[39] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[40] Walter O. Krawec. A genetic algorithm to analyze the security of quantum cryptographic protocols , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[41] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.