Experimental demonstrations of unconditional security in a purely classical regime [PDF]
So far, unconditional security in key distribution processes has been confined to quantum key distribution (QKD) protocols based on the no-cloning theorem of nonorthogonal bases.
Byoung S. Ham
doaj +8 more sources
Unconditional security from noisy quantum storage [PDF]
We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and
Koenig, Robert +2 more
core +6 more sources
High Key Rate Quantum Conference Key Agreement With Unconditional Security [PDF]
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao +5 more
doaj +5 more sources
Unconditional Security of Three State Quantum Key Distribution Protocols [PDF]
Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix
Batuwantudawe, J. +4 more
core +5 more sources
Perspective - On the thermodynamics of perfect unconditional security [PDF]
A secure key distribution (exchange) scheme is unconditionally secure if it is unbreakable against arbitrary technological improvements of computing power and/or any development of new algorithms.
Christiana Chamon, L. Kish
semanticscholar +4 more sources
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system. [PDF]
In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis.
Zoltan Gingl, Robert Mingesz
doaj +6 more sources
Unconditional security at a low cost [PDF]
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett +9 more
core +5 more sources
Unconditional security in quantum cryptography [PDF]
Basic techniques to prove the unconditional security of quantum crypto graphy are described. They are applied to a quantum key distribution protocol proposed by Bennett and Brassard [1984].
D. Mayers
semanticscholar +3 more sources
Multi-Server Verifiable Delegation of Computations: Unconditional Security and Practical Efficiency [PDF]
Information and ...
L. Zhang
semanticscholar +5 more sources
Unconditional security of quantum key distribution over arbitrarily long distances [PDF]
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing.
H. Lo, H. Chau
semanticscholar +7 more sources

