## 5,368 Citations

### Key Distillation Process on Quantum Cryptography Protocols in Network Security

- Computer Science, Mathematics
- 2012

The advantage of quantum cryptography over traditional key exchange methods is that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems.

### QUANTUM KEY DISTRIBUTION THROUGH AN ANISOTROPIC DEPOLARIZING QUANTUM CHANNEL

- Computer Science, Physics
- 2017

This work studies the depolarizing effect with an anisotropic probabilities of Bit-Flip, PhaseFlip and Bit-Phase-Flipper in the presence of an eavesdropper and proves that the phase flip probability act strongly on the exchanged information safety.

### Practical secure quantum communications

- Computer ScienceEurope Optics + Optoelectronics
- 2015

Practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping, are reviewed, demonstrating the protocols with provable security over record long distances in optical fibers and assessing the performance of the systems as well as their limitations.

### Quantum-based secure communications with no prior key distribution

- Computer ScienceSoft Comput.
- 2016

It is shown in this paper that quantum information processing can be used to do much more than just key distribution, and the quantum mechanical process of securely transmitting a message through a public channel is conceptually simpler than the two-step scenario with a quantum distributed classical key.

### Quantum cryptography: Approaching communication security from a quantum perspective

- Computer Science2014 Fotonica AEIT Italian Conference on Photonics Technologies
- 2014

A survey on the physical principles underlying the quantum approach to cryptography, including superposition principle and uncertainty relations, are given and a possible continuous variable protocol is analyzed.

### Practical quantum key distribution protocol without monitoring signal disturbance

- Computer ScienceNature
- 2014

It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.

### Fully device independent quantum key distribution

- Computer ScienceCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

### Applications of Quantum Information

- Computer Science
- 2015

This chapter presents some applications of Quantum Information Theory that deviate from the problem of reliably transmitting classical information, and devote a paragraph to the topic of quantum teleportation, that is, the transfer of an unknown quantum state between two different locations that is achieved by making use of entanglement and only transmitting classicalInformation.

### Completely device-independent quantum key distribution

- Computer Science, MathematicsPhysical Review A
- 2016

Using recent advances in the fields of randomness amplification and randomness expansion, it is demonstrated that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries -- an assumption without which any type of cryptography would be pointless to begin with.

### Hacking energy-time-entanglement quantum key distribution using classical light

- Computer Science, Physics
- 2016

This work has shown that certain implementations of QKD are vulnerable to attack because of a flawed security proof, and described how an attacker might exploit this weakness to violate the supposedly unbreakable security ofQKD.

## References

SHOWING 1-8 OF 8 REFERENCES

### Quantum Cryptography, or Unforgeable Subway Tokens

- Computer ScienceCRYPTO
- 1982

The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.

### A single quantum cannot be cloned

- PhysicsNature
- 1982

If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is…

### New Hash Functions and Their Use in Authentication and Set Equality

- Computer Science, MathematicsJ. Comput. Syst. Sci.
- 1981

### Coin flipping by telephone a protocol for solving impossible problems

- Computer ScienceSIGA
- 1983

Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets, and it will certainly prove a useful tool in solving other problems as well.

### Conjugate coding

- PhysicsSIGA
- 1983

It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.

### Experimental Realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment : A New Violation of Bell's Inequalities

- Physics
- 1982

The linear-polarization correlation of pairs of photons emitted in a radiative cascade of calcium has been measured. The new experimental scheme, using two-channel polarizers (i.e., optical analogs…

### w.;esner, 'Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!:.; published in SICAC'i' ilcws 15:1

- 1983

### Quantum Theory (Prentice-Hall, En glewood Cliffs

- NJ 1951),
- 1951