When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. realistic) quantum channel, then the raw key has to be processed to reduce the information of an adversary Eve down to an arbitrarily low value, providing Alice and Bob with a secret key. In principle, quantum algorithms as well as classical algorithms can be used for this processing. A natural question is: up to which error rate on the raw key is a secret-key agreement at all possible? Under the assumption of incoherent eavesdropping, we find that the quantum and classical limits are precisely the same: as long as Alice and Bob share some entanglement both quantum and classical protocols provide secret keys
Assume that three parties, Alice, Bob, and Eve, are presented with a sequence of identical tripartit...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
A secret key shared through quantum key distribution between two cooperative players is secure again...
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Al...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
We investigate how a classical private key can be used by two players, connected by an insecure one-...
Abstract. We consider the scenario where Alice wants to send a secret (classical) n-bit message to B...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
Assume that three parties, Alice, Bob, and Eve, are presented with a sequence of identical tripartit...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
A secret key shared through quantum key distribution between two cooperative players is secure again...
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Al...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
We investigate how a classical private key can be used by two players, connected by an insecure one-...
Abstract. We consider the scenario where Alice wants to send a secret (classical) n-bit message to B...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a co...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
Assume that three parties, Alice, Bob, and Eve, are presented with a sequence of identical tripartit...
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption th...
A secret key shared through quantum key distribution between two cooperative players is secure again...