Quantum Cryptography

@article{Gisin2001QuantumC,
  title={Quantum Cryptography},
  author={Nicolas Gisin and Gregoire Ribordy and Wolfgang Tittel and Hugo Zbinden},
  journal={Reviews of Modern Physics},
  year={2001}
}
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principle . . . . . . . . . . . . . . . 5 2 No cloning theorem . . . . . . . . . 6 3 Intercept-resend strategy… Expand
A Security Real-time Privacy Amplification Scheme in QKD System
TLDR
This paper proposes the real-time privacy amplification (RTPA) scheme which converts the weak secret string to a uniform key that is fully secret from Eve and implements the ARTPA scheme based on CLIP system, which is connected to the quantum communication system. Expand
Using quantum key distribution for cryptographic purposes: A survey
TLDR
This survey article reviews and compares the properties of the existing key establishment techniques, QKD being one of them, and studies two generic scenarios related to the practical use of QKKD in cryptographic infrastructures: 1) usingQKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QD in a network containing many users with the objective of offering any- to-any key establishment service. Expand
Quantum Cryptography
Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for theExpand
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
Abstract.Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312Expand
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems
TLDR
The experimental results show that the N-Auth algorithm can fully meet the real-time and high-performance demands of modern 10-GHz QKD systems, making it a viable solution for the implementation of industrial-strength unconditionally secure broadband communication solutions. Expand
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
TLDR
This article investigates the role of the software implementation for the security of quantum cryptography against cache side channels and proposes a cost model for the combined mitigation, which allows one to optimize the interaction between privacy amplification and program rewriting for the mitigation. Expand
A Fuzzy Vault Scheme
TLDR
Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing. Expand
Quantum Computing: The Risk to Existing Encryption Methods
The basis of modern security relies on encryption methods that are practically impossible, but theoretically possible, to break. The most common is the Rivest-Shamir-Adleman (RSA) cryptosystem, whichExpand
Quantum Cryptography: Opportunities and Challenges
TLDR
The flaws of quantum cryptographic systems are discussed along with the plans for enhancing current quantum cryptography systems. Expand
Quantum Key Distribution Protocols
  • Ramona Wolf
  • Computer Science
  • Quantum Key Distribution
  • 2021
TLDR
The goal of any quantum key distribution protocol is to generate a shared secret key between two distant parties over a public communication channel, and the key generating protocol is provably secure against any possible attack that an eavesdropper can perform. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 308 REFERENCES
The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]
  • V. F. Kleist
  • Computer Science, Physics
  • IEEE Annals of the History of Computing
  • 2002
TLDR
The Cipher of Mary Queen of Scots: From Shunning Vigenère to the Man in the Iron Mask is a posthumous publication based on a manuscript originally written by Gordon C. Dickinson in 2005 and then edited by David I. Dickinson. Expand
Advances in cryptology--CRYPTO '91 : proceedings
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-PartyExpand
Advances in Cryptology: Proceedings Of Crypto 83
TLDR
Some Public-Key Crypto-Functions as Intractable as Factorization as well as Cryptosystems and Other Hard Problems. Expand
Free-space quantum key distribution in daylight
TLDR
The theory of quantum cryptography is described, and the most recent results from the experimental free-space system with which it is demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight are described. Expand
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.
TLDR
The concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel is introduced and implemented using technology that is currently being developed. Expand
Modern Cryptology
  • G. Brassard
  • Computer Science
  • Lecture Notes in Computer Science
  • 1988
TLDR
This introductory article presents first of all the two principal categories of cryptographic procedures which are most frequently used: encryption algorithms, which serve to protect the confidentiality of data and signature algorithms which, just like handwritten signatures, guarantee the provenance and the integrity of messages. Expand
Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols
TLDR
This Letter concerns the dialog between quantum physics and information theory in the context of optimal eavesdropping on a quantum channel and the corresponding secret-key agreement that, in principle, both quantum and classical algorithms provide. Expand
Practical Quantum Cryptography: A Comprehensive Analysis (Part One)
We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels forExpand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
Quantum cryptography on multiuser optical fibre networks
TLDR
A practical scheme for multi-user quantum cryptography is introduced, and its operation on an optical fibre network is demonstrated, which enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user. Expand
...
1
2
3
4
5
...