메뉴 건너뛰기




Volumn 18, Issue 1, 2010, Pages 61-87

Security of trusted repeater quantum key distribution networks

Author keywords

QKD network; Quantum cryptography; Quantum key distribution (QKD); Secret sharing; Secure key agreement; Trusted repeater

Indexed keywords

HIGH RATE; INFORMATION-THEORETIC SECURITY; KEY AGREEMENT; ON CURRENTS; QUANTUM KEY DISTRIBUTION; SECRET KEY; SECRET KEY AGREEMENT; SECRET SHARING; SECURITY PROPERTIES;

EID: 71749089462     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0373     Document Type: Article
Times cited : (102)

References (43)
  • 4
    • 4243059985 scopus 로고
    • Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
    • C. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres and W. Wootters, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky- Rosen channels, Phys. Rev. Lett. 70 (1993), 1895.
    • (1993) Phys. Rev. Lett. , vol.70 , pp. 1895
    • Bennett, C.1    Brassard, G.2    Crepeau, C.3    Jozsa, R.4    Peres, A.5    Wootters, W.6
  • 5
    • 84928045174 scopus 로고    scopus 로고
    • Quantum cryptographic network based on quantum memories
    • E. Biham, B. Huttner and T. Mor, Quantum cryptographic network based on quantum memories, Phys. Rev. A 54 (1996), 2651.
    • (1996) Phys. Rev. A , vol.54 , pp. 2651
    • Biham, E.1    Huttner, B.2    Mor, T.3
  • 6
    • 2442492740 scopus 로고    scopus 로고
    • Quantum repeaters: The role of imperfect local operations in quantum communication
    • H.-J. Briegel, W. Dür, J.I. Cirac and P. Zoller, Quantum repeaters: The role of imperfect local operations in quantum communication, Phys. Rev. Lett. 89 (1998), 5932.
    • (1998) Phys. Rev. Lett. , vol.89 , pp. 5932
    • Briegel, H.-J.1    Dür, W.2    Cirac, J.I.3    Zoller, P.4
  • 8
    • 38049009328 scopus 로고    scopus 로고
    • Unifying Classical and Quantum Key Distillation
    • Proceedings of the 4th Theory of Cryptography Conference S.P. Vadhan, ed., Springer
    • M. Christandl, A. Ekert, M. Horodecki, P. Horodecki, J. Oppenheim and R. Renner, Unifying Classical and Quantum Key Distillation, in: Proceedings of the 4th Theory of Cryptography Conference, S.P. Vadhan, ed., Lecture Notes in Computer Science, vol.4392, Springer, 2007, p. 456.
    • (2007) Lecture Notes in Computer Science , vol.4392 , pp. 456
    • Christandl, M.1    Ekert, A.2    Horodecki, M.3    Horodecki, P.4    Oppenheim, J.5    Renner, R.6
  • 9
    • 26644437729 scopus 로고    scopus 로고
    • Quantum relays for long-distance quantum cryptography
    • D. Collins, N. Gisin and H. de Riedmatten, Quantum relays for long-distance quantum cryptography, J. Modern Opt. 52 (2005), 735.
    • (2005) J. Modern Opt. , vol.52 , pp. 735
    • Collins, D.1    Gisin, N.2    De Riedmatten, H.3
  • 10
    • 84888077711 scopus 로고    scopus 로고
    • Perfectly secure message transmission revisited in: Advances in Cryptology
    • Proceedings of Eurocrypt 2002 L. Knudsen ed., Springer
    • I. Desmedt and Y. Wang, Perfectly secure message transmission revisited, in: Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen ed., Lecture Notes in Computer Science, vol.2332, Springer, 2002, p. 502.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 502
    • Desmedt, I.1    Wang, Y.2
  • 14
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts and M. Yung, Perfectly secure message transmission, J. ACM 40 (1993), 17.
    • (1993) J. ACM , vol.40 , pp. 17
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 15
  • 16
    • 1242285756 scopus 로고    scopus 로고
    • Building the quantum network
    • C. Elliott, Building the quantum network, New J. Phys. 4 (2002), 46.
    • (2002) New J. Phys. , vol.4 , pp. 46
    • Elliott, C.1
  • 17
    • 27644552955 scopus 로고    scopus 로고
    • Current status of the DARPA quantum network
    • E. Donkor, A. Pirich and H. Brandt, eds, Proc. SPIE, vol.5815, SPIE - The International Society for Optical Engineering
    • C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J. Schlafer and H. Yeh, Current status of the DARPA quantum network, in: Quantum Information and Computation III, E. Donkor, A. Pirich and H. Brandt, eds, Proc. SPIE, vol.5815, SPIE - The International Society for Optical Engineering, 2005, p. 138.
    • (2005) Quantum Information and Computation III , pp. 138
    • Elliott, C.1    Colvin, A.2    Pearson, D.3    Pikalo, O.4    Schlafer, J.5    Yeh, H.6
  • 20
    • 71749104990 scopus 로고    scopus 로고
    • http://www.secoqc.net.
  • 21
    • 71749105386 scopus 로고    scopus 로고
    • http://www.smartquantum.com, http://www.magiqtech.com
    • http://www.idquantique.com, http://www.smartquantum.com, http://www.magiqtech.com.
  • 22
    • 27144544067 scopus 로고    scopus 로고
    • Lower and upper bounds on the secret-key rate for Quantum Key Distribution protocols using one-way classical communication
    • B. Kraus, N. Gisin and R. Renner, Lower and upper bounds on the secret-key rate for Quantum Key Distribution protocols using one-way classical communication, Phys. Rev. Lett. 95 (2005), 080501.
    • (2005) Phys. Rev. Lett. , vol.95 , pp. 080501
    • Kraus, B.1    Gisin, N.2    Renner, R.3
  • 23
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Proc. of CRYPTO'94 Y. Desmedt, ed., Springer
    • H. Krawczyk, LFSR-based hashing and authentication, in: Proc. of CRYPTO'94, Y. Desmedt, ed., Lecture Notes in Computer Science, vol.839, Springer, 1994, p. 129.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 129
    • Krawczyk, H.1
  • 26
    • 34047263436 scopus 로고    scopus 로고
    • Small accessible quantum information does not imply security
    • R. König, R. Renner, A. Bariska and U. Maurer, Small accessible quantum information does not imply security, Phys. Rev. Lett. 98 (2007), 140502.
    • (2007) Phys. Rev. Lett. , vol.98 , pp. 140502
    • König, R.1    Renner, R.2    Bariska, A.3    Maurer, U.4
  • 28
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Math. 48 (2001), 351.
    • (2001) J. Assoc. Comput. Math. , vol.48 , pp. 351
    • Mayers, D.1
  • 30
    • 44049099202 scopus 로고    scopus 로고
    • Outline of the SECOQC Quantum-Key-Distribution network in Vienna
    • A. Poppe, M. Peev and O. Maurhart, Outline of the SECOQC Quantum-Key-Distribution network in Vienna, Int. J. Quant. Inf. (IJQI) 6 (2008), 209.
    • (2008) Int. J. Quant. Inf. (IJQI) , vol.6 , pp. 209
    • Poppe, A.1    Peev, M.2    Maurhart, O.3
  • 31
    • 44049101670 scopus 로고    scopus 로고
    • Security of Quantum Key Distribution
    • R. Renner, Security of Quantum Key Distribution, Int. J. Quant. Inf. (IJQI) 6 (2008), 1.
    • (2008) Int. J. Quant. Inf. (IJQI) , vol.6 , pp. 1
    • Renner, R.1
  • 32
    • 27144550522 scopus 로고    scopus 로고
    • Information-theoretic security proof for Quantum-Key-Distribution protocols
    • R. Renner, N. Gisin and B. Kraus, Information-theoretic security proof for Quantum-Key-Distribution protocols, Phys. Rev. A 72 (2005), 012332.
    • (2005) Phys. Rev. A , vol.72 , pp. 012332
    • Renner, R.1    Gisin, N.2    Kraus, B.3
  • 33
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, J. Kilian, ed., Springer
    • R. Renner and R. König, Universally composable privacy amplification against quantum adversaries, in: Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, J. Kilian, ed., Lecture Notes in Computer Science, vol.3378, Springer, 2005, p. 407.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 407
    • Renner, R.1    König, R.2
  • 37
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C.E. Shannon, A mathematical theory of communication, Bell System Technical Journal 27 (1948), 379, 623.
    • (1948) Bell System Technical Journal , vol.27 , pp. 623
    • Shannon, C.E.1
  • 38
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28 (1949), 656.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656
    • Shannon, C.E.1
  • 39
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 Quantum Key Distribution protocol
    • P.W. Shor and J. Preskill, Simple proof of security of the BB84 Quantum Key Distribution protocol, Phys. Rev. Lett. 85 (2000), 441.
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 40
    • 84942520895 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • Proc. Crypto'96, N. Koblitz, ed., Springer
    • V. Shoup, On fast and provably secure message authentication based on universal hashing, in: Proc. Crypto'96, N. Koblitz, ed., Lecture Notes in Computer Science, vol.1109, Springer, 1996, p. 313.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 313
    • Shoup, V.1
  • 42
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, J. Comp. System Sci. 22 (1981), 265.
    • (1981) J. Comp. System Sci. , vol.22 , pp. 265
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.