Quantum cryptography

N Gisin, G Ribordy, W Tittel, H Zbinden - Reviews of modern physics, 2002 - APS
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Unconditional security of quantum key distribution over arbitrarily long distances

HK Lo, HF Chau - science, 1999 - science.org
Quantum key distribution is widely thought to offer unconditional security in communication
between two users. Unfortunately, a widely accepted proof of its security in the presence of …

Security of quantum key distribution

R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …

Unconditional security in quantum cryptography

D Mayers - Journal of the ACM (JACM), 2001 - dl.acm.org
Basic techniques to prove the unconditional security of quantum crypto graphy are
described. They are applied to a quantum key distribution protocol proposed by Bennett and …

Device-independent quantum secure direct communication against collective attacks

L Zhou, YB Sheng, GL Long - Science Bulletin, 2020 - Elsevier
Abstract “Device-independent” not only represents a relaxation of the security assumptions
about the internal working of the quantum devices, but also can enhance the security of the …

Information-theoretic security proof for quantum-key-distribution protocols

R Renner, N Gisin, B Kraus - Physical Review A—Atomic, Molecular, and …, 2005 - APS
We present a technique for proving the security of quantum-key-distribution (QKD) protocols.
It is based on direct information-theoretic arguments and thus also applies if no equivalent …

Optimal eavesdrop** in quantum cryptography. I. Information bound and optimal strategy

CA Fuchs, N Gisin, RB Griffiths, CS Niu, A Peres - Physical Review A, 1997 - APS
Abstract We consider the Bennett-Brassard cryptographic scheme, which uses two
conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits …

Long-distance quantum key distribution secure against coherent attacks

B Fröhlich, M Lucamarini, JF Dynes, LC Comandar… - Optica, 2017 - opg.optica.org
Quantum key distribution (QKD) permits information-theoretically secure transmission of
digital encryption keys, assuming that the behavior of the devices employed for the key …