Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the ε-security of quantum key distribution. We present efficient and noise-tolerant protocols exploiting multipartite Greenberger-Horne-Zeilinger (GHZ) states and prove their security in the finite-key regime. We analyze the performance of our protocols in noisy and lossy quantum networks and compare with protocols that only use bipartite entanglement to achieve the same functionalities. Our simula...
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference) set...
Secure quantum conferencing refers to a protocol where a number of trusted users generate exactly th...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
We approach two interconnected problems of quantum information processing in networks: Conference ke...
International audienceQuantum communication networks have the potential to revolutionize information...
The phenomenal progress in quantum technologies over the past decades has laid the groundwork for th...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
We consider the problem of hiding sender and recipient of classical and quantum bits, even if all ph...
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference) set...
Secure quantum conferencing refers to a protocol where a number of trusted users generate exactly th...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication t...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a ne...
We approach two interconnected problems of quantum information processing in networks: Conference ke...
International audienceQuantum communication networks have the potential to revolutionize information...
The phenomenal progress in quantum technologies over the past decades has laid the groundwork for th...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
We consider the problem of hiding sender and recipient of classical and quantum bits, even if all ph...
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference) set...
Secure quantum conferencing refers to a protocol where a number of trusted users generate exactly th...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...