[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Maeda et al., 2019 - Google Patents

Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit

Maeda et al., 2019

View HTML @Full View
Document ID
11701516336694977223
Author
Maeda K
Sasaki T
Koashi M
Publication year
Publication venue
Nature communications

External Links

Snippet

Quantum key distribution (QKD) over a point-to-point link enables us to benefit from a genuine quantum effect even with conventional optics tools such as lasers and photon detectors, but its capacity is limited to a linear scaling of the repeaterless bound. Recently …
Continue reading at www.nature.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Similar Documents

Publication Publication Date Title
Maeda et al. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit
Matsuura et al. Finite-size security of continuous-variable quantum key distribution with digital signal processing
Schwonnek et al. Device-independent quantum key distribution with random key basis
Zeng et al. Mode-pairing quantum key distribution
Curty et al. Simple security proof of twin-field type quantum key distribution protocol
Nadlinger et al. Experimental quantum key distribution certified by Bell's theorem
Curty et al. Finite-key analysis for measurement-device-independent quantum key distribution
Yu et al. Sending-or-not-sending twin-field quantum key distribution in practice
Arnon-Friedman et al. Practical device-independent quantum cryptography via entropy accumulation
Leditzky et al. Playing games with multiple access channels
Currás-Lorenzo et al. Tight finite-key security for twin-field quantum key distribution
Masanes et al. Secure device-independent quantum key distribution with causally independent measurement devices
Coles et al. Numerical approach for unstructured quantum key distribution
Tomamichel et al. Tight finite-key analysis for quantum cryptography
Yin et al. Tight security bounds for decoy-state quantum key distribution
Yoshino et al. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses
Brown et al. Computing conditional entropies for quantum correlations
Kupko et al. Tools for the performance optimization of single-photon quantum key distribution
Poderini et al. Experimental violation of n-locality in a star quantum network
Bunandar et al. Numerical finite-key analysis of quantum key distribution
Kocsis et al. Experimental measurement-device-independent verification of quantum steering
Wang et al. Characterising the correlations of prepare-and-measure quantum networks
Wang et al. Optimized protocol for twin-field quantum key distribution
Tan et al. Computing secure key rates for quantum cryptography with untrusted devices
Yin et al. Finite-key analysis for twin-field quantum key distribution with composable security