2022
DOI: 10.1007/s11128-022-03691-7
|View full text |Cite
|
Sign up to set email alerts
|

Simple proof of security of the multiparty prepare and measure QKD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Step 5: Alice and Bob perform a shared hash function H on their binary secret information to obtain a binary sequence of the specified length. The hash function H is described as Equation (8).…”
Section: Qpc Protocol Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 5: Alice and Bob perform a shared hash function H on their binary secret information to obtain a binary sequence of the specified length. The hash function H is described as Equation (8).…”
Section: Qpc Protocol Descriptionmentioning
confidence: 99%
“…QPC has potential applications in a variety of fields, including secure online voting, financial transactions, and data sharing between government agencies. However, the majority of QPC protocols have a common feature that the protocols need to perform QKD [8] and then encrypt and compare secret information. Using QKD to avoid possible security risks can make the protocol simpler and easier at the physical implementation level; nevertheless, this type of QPC protocol has room for improvement in quantum efficiency and utilization of quantum resources [9].…”
Section: Introductionmentioning
confidence: 99%
“…Several QCKA protocols have been proposed, most of which utilize a multipartite quantum entanglement state such as a Greenberger-Horne-Zeilinger (GHZ) state [2][3][4][5][6][7][8]. The central node generates a multipartite entangled state and sends one photon in the entangled state to each party.…”
Section: Introductionmentioning
confidence: 99%