2021
DOI: 10.48550/arxiv.2102.00021
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security in Quantum Cryptography

Christopher Portmann,
Renato Renner

Abstract: Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated recipients, even if the communication channel is untrusted. In classical cryptography, this can usually only be guaranteed under computational hardness assumptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 246 publications
(390 reference statements)
0
22
0
Order By: Relevance
“…click is Bob-Eve's measurement operator associated to observing a click in the u-th round, which acts on systems B and E and depends on all the classical information publicly announced by Alice and Bob up to that round, and |Ψ ABCE is given in Eq. (3).…”
Section: Security Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…click is Bob-Eve's measurement operator associated to observing a click in the u-th round, which acts on systems B and E and depends on all the classical information publicly announced by Alice and Bob up to that round, and |Ψ ABCE is given in Eq. (3).…”
Section: Security Proofmentioning
confidence: 99%
“…Quantum key distribution (QKD) [1][2][3][4] is arguably the most mature practical application of quantum information science, allowing to establish information-theoretic secure communications between two distant parties (commonly known as Alice and Bob) by combining the distribution of quantum systems to generate symmetric cryptographic keys with the well-known one-time-pad encryption scheme [5]. Unlike classical methods, whose security typically relies on computational assumptions, the security of QKD is only based on quantum information principles, and thus protects against any potential eavesdropper (Eve) with unlimited computational power.…”
Section: Introductionmentioning
confidence: 99%
“…The best-known quantum cryptographic service is quantum key distribution (QKD), in which quantum characteristics are used to assess the probability of the presence of an eavesdropper as a stream of shared, random bits is created 1 . These random, shared, believed-to-be-secret [29,69,91] bits can be used in key cryptographic protocols [2,30,60]. However, this is not the only cryptographic service that is possible; secret sharing [20,41,48,55], secure election protocols [78], and byzantine agreement protocols [9,77] are all known.…”
Section: Quantum Communication Is Desirablementioning
confidence: 99%
“…Let Alice and Charlie be honest and let Bob be dishonest. Bob implements the following man-in-themiddle attack with the effect that o = o ′ [48,49].…”
Section: Composabilitymentioning
confidence: 99%