Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA), an extension of key distribution to multiple parties, has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity. In this work, we propose an anonymous CKA protocol for three parties that is implemented in a highly practical network setting. Specifically, a line of quantum repeater nodes is used to build a linear cluster state among all nodes, which is then used to anonymously establish a secret key between any three of them. The nodes need only share maximally ...
The phenomenal progress in quantum technologies over the past decades has laid the groundwork for th...
Quantum conference key agreement is an important cryptographic primitive for future quantum network....
Quantum communication protocols invoke one of the most fundamentallaws of quantum mechanics, namely ...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Quantum cryptography is a major ingredient of the future quantum internet that promises various secu...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Abstract. Applying multipartite entanglement purification protocol, we present a quantum key distrib...
Abstract Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryptio...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by...
One of the great promises of quantum technology is the development of quantum networks, which will a...
The phenomenal progress in quantum technologies over the past decades has laid the groundwork for th...
Quantum conference key agreement is an important cryptographic primitive for future quantum network....
Quantum communication protocols invoke one of the most fundamentallaws of quantum mechanics, namely ...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Quantum cryptography is a major ingredient of the future quantum internet that promises various secu...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Abstract. Applying multipartite entanglement purification protocol, we present a quantum key distrib...
Abstract Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryptio...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by...
One of the great promises of quantum technology is the development of quantum networks, which will a...
The phenomenal progress in quantum technologies over the past decades has laid the groundwork for th...
Quantum conference key agreement is an important cryptographic primitive for future quantum network....
Quantum communication protocols invoke one of the most fundamentallaws of quantum mechanics, namely ...