Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Acín A et al (2007) Device-independent security of quantum cryptography against collective attacks. Phys Rev Lett 98:230501
Ben-Or M, Horodecki M, Leung DW, Mayers D, Oppenheim J (2005) The universal composable security of quantum key distribution. In: Second theory of cryptography conference TCC. Lecture notes in computer science, vol 3378. Springer, Berlin, pp 386–406. Also available at http://arxiv.org/abs/quant-ph/0409078
Bennett CH, Brassard G (1984) Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing. IEEE Computer Society, Los Alamitos, pp 175–179
Bennett CH, Brassard G, Crépeau C, Maurer U (1995) Generalized privacy amplification. IEEE Trans Inf Theory 41(6):1915–1923
Bennett CH, Brassard G, Popescu S, Schumacher B, Smolin J, Wootters W (1996) Purification of noisy entanglement and faithful teleportation via noisy channels. Phys Rev Lett 76:722–726
Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24:339–348
Devetak I, Winter A (2005) Distillation of secret key and entanglement from quantum states. Proc R Soc Lond A 461:207–235
Ekert AK (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663
Ekert A, Renner R (2014) The ultimate physical limits of privacy. Nature 507:443–447
Fuchs CA, Gisin N, Griffiths RB, Niu C, Peres A (1997) Optimal eavesdropping in quantum cryptography, I. Information bound and optimal strategy. Phys Rev A 56:1163–1172
Gisin N, Ribordy G, Tittel W, Zbinden H (2002) Quantum cryptography. Rev Mod Phys 74:145–195
Lo H-K, Chau HF (1999) Unconditional security of quantum key distribution over arbitrarily long distances. Science 283:2050–2056
Mayers D (1996) Quantum key distribution and string oblivious transfer in noisy channels. In: Advances in cryptology – CRYPTO ’96. Lecture notes in computer science, vol 1109. Springer, Berlin, pp 343–357
Renner R (2005) Security of quantum key distribution. Ph.D. thesis, Swiss Federal Institute of Technology (ETH) Zurich. Also available at http://arxiv.org/abs/quant-ph/0512258
Renner R (2007) Symmetry of large physical systems implies independence of subsystems. Nat Phys 3:645–649
Renner R, König R (2005) Universally composable privacy amplification against quantum adversaries. In: Second theory of cryptography conference TCC. Lecture notes in computer science, vol 3378. Springer, Berlin, pp 407–425. Also available at http://arxiv.org/abs/quant-ph/0403133
Renner R, Wolf S (2003) Unconditional authenticity and privacy from an arbitrarily weak secret. In: Proceedings of Crypto 2003. Lecture notes in computers science, vol 2729. Springer, Berlin, pp 78–95
Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441
Wegman MN, Carter JL (1981) New hash functions and their use in authentication and set equality. J Comput Syst Sci 22:265–279
Wiesner S (1983) Conjugate coding. Sigact News 15(1):78–88
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media New York
About this entry
Cite this entry
Renner, R. (2016). Quantum Key Distribution. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2864-4_316
Download citation
DOI: https://doi.org/10.1007/978-1-4939-2864-4_316
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-2863-7
Online ISBN: 978-1-4939-2864-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering