Maeda et al., 2019 - Google Patents
Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limitMaeda et al., 2019
View HTML- Document ID
- 11701516336694977223
- Author
- Maeda K
- Sasaki T
- Koashi M
- Publication year
- Publication venue
- Nature communications
External Links
Snippet
Quantum key distribution (QKD) over a point-to-point link enables us to benefit from a genuine quantum effect even with conventional optics tools such as lasers and photon detectors, but its capacity is limited to a linear scaling of the repeaterless bound. Recently …
- 238000004458 analytical method 0 title description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maeda et al. | Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit | |
Matsuura et al. | Finite-size security of continuous-variable quantum key distribution with digital signal processing | |
Schwonnek et al. | Device-independent quantum key distribution with random key basis | |
Zeng et al. | Mode-pairing quantum key distribution | |
Curty et al. | Simple security proof of twin-field type quantum key distribution protocol | |
Nadlinger et al. | Experimental quantum key distribution certified by Bell's theorem | |
Curty et al. | Finite-key analysis for measurement-device-independent quantum key distribution | |
Yu et al. | Sending-or-not-sending twin-field quantum key distribution in practice | |
Arnon-Friedman et al. | Practical device-independent quantum cryptography via entropy accumulation | |
Leditzky et al. | Playing games with multiple access channels | |
Currás-Lorenzo et al. | Tight finite-key security for twin-field quantum key distribution | |
Masanes et al. | Secure device-independent quantum key distribution with causally independent measurement devices | |
Coles et al. | Numerical approach for unstructured quantum key distribution | |
Tomamichel et al. | Tight finite-key analysis for quantum cryptography | |
Yin et al. | Tight security bounds for decoy-state quantum key distribution | |
Yoshino et al. | Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses | |
Brown et al. | Computing conditional entropies for quantum correlations | |
Kupko et al. | Tools for the performance optimization of single-photon quantum key distribution | |
Poderini et al. | Experimental violation of n-locality in a star quantum network | |
Bunandar et al. | Numerical finite-key analysis of quantum key distribution | |
Kocsis et al. | Experimental measurement-device-independent verification of quantum steering | |
Wang et al. | Characterising the correlations of prepare-and-measure quantum networks | |
Wang et al. | Optimized protocol for twin-field quantum key distribution | |
Tan et al. | Computing secure key rates for quantum cryptography with untrusted devices | |
Yin et al. | Finite-key analysis for twin-field quantum key distribution with composable security |