2009 Third International Conference on Quantum, Nano and Micro Technologies 2009
DOI: 10.1109/icqnm.2009.26
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretic Security Analysis of Quantum Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
2

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 8 publications
0
7
0
1
Order By: Relevance
“…In the quantum cryptography area, the problem network topology design to optimally support QKD has received attention in [11], [12], [13], [14]. Such considerations are justified and substantiated by previous findings [3] that multipath transmission is actually a necessity for confidential conversation (cf.…”
Section: A Related Work and Contributionmentioning
confidence: 59%
See 1 more Smart Citation
“…In the quantum cryptography area, the problem network topology design to optimally support QKD has received attention in [11], [12], [13], [14]. Such considerations are justified and substantiated by previous findings [3] that multipath transmission is actually a necessity for confidential conversation (cf.…”
Section: A Related Work and Contributionmentioning
confidence: 59%
“…That gap motivated this work, as it poses the question for the minimal extension to a given graph to permit MPT in the sense as [6], [5], [7] and others attempt it. References [12], [13], [14] studied and classified the problem as at least NP-hard, which in turn motivates our search for approximations rather than exact solutions.…”
Section: A Related Work and Contributionmentioning
confidence: 99%
“…Darunter Ansätze über Mehrwege-Übertragung [16,23], theoretische Betrachtungen von Kanälen mit "unbeschränkter" Länge [14] und Sicherheitsanalysen von Systemen mit nicht-vertrauenswürdiger Hardware [1]. Darunter Ansätze über Mehrwege-Übertragung [16,23], theoretische Betrachtungen von Kanälen mit "unbeschränkter" Länge [14] und Sicherheitsanalysen von Systemen mit nicht-vertrauenswürdiger Hardware [1].…”
Section: Weitere Entwicklungenunclassified
“…Of course, this assumption is dramatic and most surely not correct, but as we seek to assure the quality of decisions against all scenarios, it turns out as a sharp worst-case scenario sketch. This is made explicit in the following result: Proposition 4.1 (Rass & Schartner (2009)). Let Γ =( N, PS, H) with N = {1, 2}, PS = {PS 1 , PS 2 }, and H = x T Ay, x T By ) be a bi-matrix game with game-matrices A ∈ R |PS 1 |×|PS 2 | , B ∈ R |PS 2 |×|PS 1 | for player 1 (honest) and player 2 (adversary), respectively.…”
Section: Matrix-gamesmentioning
confidence: 99%