Results 21 to 30 of about 49,087 (283)

Quantum Cryptography

open access: yes, 2009
There is no abstract for this review article.
Lo, Hoi-Kwong, Zhao, Yi
openaire   +2 more sources

Multipartite Classical and Quantum Secrecy Monotones [PDF]

open access: yes, 2002
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl   +22 more
core   +2 more sources

A New Era of Cryptography : Quantum Cryptography [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2016
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire   +2 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Quantum Advantage in Cryptography

open access: yesAIAA Journal, 2023
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle?
Renato Renner, Ramona Wolf
openaire   +2 more sources

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Basic concepts in quantum computation [PDF]

open access: yes, 2000
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity ...
A. Barenco   +40 more
core   +4 more sources

Security in quantum cryptography

open access: yesReviews of Modern Physics, 2022
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated ...
Christopher Portmann, Renato Renner
openaire   +2 more sources

Gaussian Quantum Information [PDF]

open access: yes, 2011
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits.
Arthurs, E.   +48 more
core   +2 more sources

Composability in quantum cryptography

open access: yesNew Journal of Physics, 2009
In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission).
Müller-Quade, Jörn, Renner, Renato
openaire   +5 more sources

Home - About - Disclaimer - Privacy