2016
DOI: 10.1364/oe.24.006594
|View full text |Cite
|
Sign up to set email alerts
|

Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources

Abstract: In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
1

Relationship

5
4

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 61 publications
0
14
0
Order By: Relevance
“…The advantages of quantum CKA over repeating QKD in quantum networks are that quantum CKA requires fewer resource qubits, transmits fewer classical bits and performs fewer rounds of error correction and privacy amplification steps, which have been illustrated by researchers [7]. After more than two decades of development, many quantum CKA protocols have been proposed [7][8][9][10][11][12][13][14][15][16][17][18][19][20], including measurementdevice-independent [8] and device-independent [15] protocols. Details can be found in the review article [21].…”
Section: Introductionmentioning
confidence: 99%
“…The advantages of quantum CKA over repeating QKD in quantum networks are that quantum CKA requires fewer resource qubits, transmits fewer classical bits and performs fewer rounds of error correction and privacy amplification steps, which have been illustrated by researchers [7]. After more than two decades of development, many quantum CKA protocols have been proposed [7][8][9][10][11][12][13][14][15][16][17][18][19][20], including measurementdevice-independent [8] and device-independent [15] protocols. Details can be found in the review article [21].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, the measurement-device-independent CKA protocol [10] has been proposed via post-selected Greenberger-Horne-Zeilinger (GHZ) entanglement [11], [12]. It has been generalized extensively to various cases including finite size [13], [14], continuous variables [15], [16] and four users with W state [17]. Moreover, the finite-key analysis with composable security [18], device independence [19], [20] and other special cases [21]- [23] are also considered in quantum CKA.…”
Section: Introductionmentioning
confidence: 99%
“…Basic laws of quantum mechanics combined with one-time pad encryption [30] guarantee the security of multiparty quantum communication [24,31]. Currently, QCKA has been generalized to other variants both in theory [32][33][34][35][36][37][38][39][40] and experiment [41].…”
Section: Introductionmentioning
confidence: 99%