2014
DOI: 10.1016/j.tcs.2014.09.018
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
99
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 143 publications
(99 citation statements)
references
References 112 publications
(165 reference statements)
0
99
0
Order By: Relevance
“…• Experimental implementations Experimental implementations of quantum cryptography are mostly focused on QKD (see [8]), but also include quantum coin flipping [31,182,189], quantum secret sharing [212], delegated quantum computation [17,114], limited-quantumstorage cryptography [105,188], and device-independent randomness generation [75,194].…”
Section: Further Topicsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Experimental implementations Experimental implementations of quantum cryptography are mostly focused on QKD (see [8]), but also include quantum coin flipping [31,182,189], quantum secret sharing [212], delegated quantum computation [17,114], limited-quantumstorage cryptography [105,188], and device-independent randomness generation [75,194].…”
Section: Further Topicsmentioning
confidence: 99%
“…In OT, Alice sends two messages m 0 , m 1 to Bob who receives only one of the messages m c according to his choice bit c. Security for Alice (against dishonest Bob) guarantees that Bob receives only one of the two messages, whereas security for Bob (against dishonest Alice) ensures that Alice does not learn anything about Bob's choice bit. 8 In the version by Rabin [195], this primitive is essentially a secure erasure channel where Alice sends a single bit to Bob. This bit gets erased with probability 1/2 (in this case Bob receives ⊥), but Alice does not learn whether the bit was erased.…”
Section: Oblivious Transfer (Ot) and Bit Commitment (Bc)mentioning
confidence: 99%
“…From a cryptographic viewpoint, the most important feature of QKD is its ability to offer established keys with the unconditional secure property. For details on the integration of QKD in security infrastructures, the reader is kindly advised to refer to [23] and [24], for example.  Hybrid PKI-based approach: There are some researchers (See for example [25]) who think that properly combining QKD with public-key based authentication can also provide working environment with enhanced properties.…”
Section: Presentation Tiermentioning
confidence: 99%
“…The most significant advantage of the COW protocol is simplicity of its realization [13,[18][19][20], which is related to its simple optical scheme. This protocol is easy to implement in experiment, and it has been used in the project on the design of European network for quantum key distribution SEC-OQC [21]. However, despite prevalence of this method and its high practical importance, an analysis of the possibility of attacks, which give to an eavesdropper an opportunity to obtain information about a quantum key, is an important task [18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…This protocol is easy to implement in experiment, and it has been used in the project on the design of European network for quantum key distribution SEC-OQC [21]. However, despite prevalence of this method and its high practical importance, an analysis of the possibility of attacks, which give to an eavesdropper an opportunity to obtain information about a quantum key, is an important task [18][19][20][21][22][23][24][25][26]. We note that lower bounds on the key generation rate of a variant of the coherentone-way quantum key distribution protocol have been obtained in Ref.…”
Section: Introductionmentioning
confidence: 99%