A Simple Security Proof for Entanglement-Based Quantum Key Distribution
@article{Mafu2016ASS, title={A Simple Security Proof for Entanglement-Based Quantum Key Distribution}, author={Mhlambululi Mafu}, journal={Journal of Quantum Information Science}, year={2016}, volume={06}, pages={296-303}, url={https://api.semanticscholar.org/CorpusID:27285775} }
It is shown by a simple security proof that for any state sent by the sender, the eavesdropper can only guess the output state with a probability that will allow her not to learn more than half of the classical Shannon information shared between the legitimate parties.
Topics
Quantum Cryptography (opens in a new tab)Security Proofs (opens in a new tab)Shared Key (opens in a new tab)Cryptographic Tasks (opens in a new tab)Key Distribution (opens in a new tab)Output States (opens in a new tab)Entanglementbased (opens in a new tab)Quantum Key Distribution (opens in a new tab)
5 Citations
Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution
- 2018
Computer Science, Physics
The objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel and the simulation study has reaffirmed the results of Qber and rawKey efficiencies for the single quantum channels BB84 Protocol.
Security of quantum-key-distribution protocol by using the post-selection technique
- 2021
Physics, Computer Science
Quantum metamaterials: Applications in quantum information science
- 2025
Physics
Metamaterials are a class of artificially engineered materials with periodic structures possessing exceptional properties not found in conventional materials. This definition can be extended when we…
Deep Neural Network Based Reconciliation for CV-QKD
- 2022
Computer Science, Physics
A high-speed reconciliation scheme that uses the deep neural network to optimize the decoding process of the low-density parity-check (LDPC) code and an improved decoding algorithm that can also reduce the FER, thereby increasing the secret key rate.
25 References
Simple proof of security of the BB84 quantum key distribution protocol
- 2000
Physics
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be…
Optimal Eavesdropping in Quantum Cryptography with Six States
- 1998
Physics
A generalization of the quantum cryptographic protocol by Bennett and Brassard is discussed, using three conjugate bases, i.e. six states, and it is shown that this scheme is safer against eavesdropping on single qubits than the one based on two conjugates.
Unconditional security of quantum key distribution over arbitrarily long distances
- 1999
Computer Science, Physics
The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.
Quantum cryptography: Public key distribution and coin tossing
- 2014
Computer Science, Physics
Unconditional security in quantum cryptography
- 2001
Physics, Computer Science
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.
Experimental quantum cryptography
- 2004
Physics
An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Quantum cryptography using any two nonorthogonal states.
- 1992
Physics
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.
Quantum cryptography
- 2001
Physics, Computer Science
The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
The security of practical quantum key distribution
- 2009
Physics, Computer Science
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Three-state quantum cryptography
- 2000
Physics
A protocol for quantum key distribution using three mutually non-orthogonal states that generates key bits most efficiently for three symmetric states is introduced.