Attainable Unconditional Security for Shared-Key Cryptosystems
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fabrizio Biondi +2 more
semanticscholar +5 more sources
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing [PDF]
We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning.
C. H. Bennett +7 more
core +2 more sources
Unconditional Security of Single-Photon Differential Phase Shift Quantum Key Distribution [PDF]
In this Letter, we prove the unconditional security of single-photon differential phase shift quantum key distribution (DPS-QKD) protocol, based on the conversion to an equivalent entanglement-based protocol.
C. H. Bennett +7 more
core +2 more sources
Unconditional Security by the Laws of Classical Physics [PDF]
Abstract There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often ...
R. Mingesz +7 more
semanticscholar +4 more sources
Quantum key distribution based on private states: unconditional security over untrusted channels with zero quantum capacity [PDF]
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) [quant-ph/0309110] from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify
Horodecki, Karol +4 more
core +3 more sources
Normalized Unconditional ϵ-Security of Private-Key Encryption [PDF]
In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity.
Lvqing Bi, Songsong Dai, Bo Hu
doaj +2 more sources
Collective attacks and unconditional security in continuous variable quantum key distribution [PDF]
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core +4 more sources
Unconditional security of coherent-state quantum key distribution with strong phase-reference pulse [PDF]
We prove the unconditional security of a quantum key distribution protocol in which bit values are encoded in the phase of a weak coherent-state pulse relative to a strong reference pulse. In contrast to implementations in which a weak pulse is used as a
C. H. Bennett +2 more
core +3 more sources
Secure secret reconstruction and multi-secret sharing schemes with unconditional security [PDF]
ABSTRACTIn Shamir's (t,n) secret sharing (SS) scheme, the secretsis divided intonshares by a dealer and is shared amongnshareholders in such a way that anytor more thantshares can reconstruct this secret; but fewer thantshares cannot obtain any information about the secrets.
L. Harn
semanticscholar +2 more sources
Multi-Party Semi-Quantum Simultaneous Ascending Auction Protocol Based on Single-Particle States [PDF]
Simultaneous ascending auctions find extensive applications in spectrum licensing and advertising space allocation. However, existing quantum sealed-bid auction protocols suffer from dual limitations: they cannot support multi-item simultaneous bidding ...
Xiuqi Wu +4 more
doaj +2 more sources

