2009
DOI: 10.1088/1367-2630/11/8/085006
|View full text |Cite
|
Sign up to set email alerts
|

Composability in quantum cryptography

Abstract: If we combine two secure cryptographic systems, is the resulting system still secure? Answering this question is highly non-trivial and has recently sparked a considerable research effort, in particular in the area of classical cryptography. A central insight was that the answer to the question is yes, but only within a well specified composability framework and for carefully chosen security definitions.In this article, we review several aspects of composability in the context of quantum cryptography. The firs… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
152
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 146 publications
(152 citation statements)
references
References 46 publications
0
152
0
Order By: Relevance
“…Before stating the protocol, let us quickly review the security framework 35,36 that we are considering here. A general QKD protocol (executed by Alice and Bob) generates either a pair of bit strings S A and S B , or a symbol ?…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Before stating the protocol, let us quickly review the security framework 35,36 that we are considering here. A general QKD protocol (executed by Alice and Bob) generates either a pair of bit strings S A and S B , or a symbol ?…”
Section: Resultsmentioning
confidence: 99%
“…With this security definition we are able to guarantee that the security of the protocol holds even when combined with other protocols, that is, the protocol is secure in the so-called universally composable framework 35,36 .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…By setting and erco to sufficiently small values, the honest parties can be confident of the fact that the secret key generated by the protocol is indistinguishable from an ideal secret key (10). This implies that the protocol is secure according to the strongest notion of security, the so called universally-composable security [21,34] (see Section II E).…”
Section: B Main Resultsmentioning
confidence: 99%
“…This is the strongest notion of security, and it is called universally composable security [19,20,34,35]. It is often the case that the secret key generated by a QKD protocol is used as an ingredient for another cryptographic task.…”
Section: E Security Definitionmentioning
confidence: 99%