Discovery of robust protocols for secure quantum cryptography
Abstract
References
Index Terms
- Discovery of robust protocols for secure quantum cryptography
Recommendations
Collusive attacks to "circle-type" multi-party quantum key agreement protocols
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate ...
Challenges in Quantum Key Distribution: A Review
ICINS '16: Proceedings of the 4th International Conference on Information and Network SecurityQuantum computing is essentially exploiting and harnessing the laws of quantum mechanics to process information. With it, rise the era of a new cryptosystem that has the potential to be unconditionally secure which is known as quantum cryptography. ...
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables
We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob. This is achieved ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/1aed3e34-36c1-4f55-aacc-074c05fec2e8/3319619.cover.jpg)
- Editor:
- Manuel López-Ibáñez,
- General Chairs:
- Anne Auger,
- Thomas Stützle
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 114Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in