Anonymous Transmission: Difference between revisions

Jump to navigation Jump to search
Line 25: Line 25:


==Further Information==
==Further Information==
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in (2). For device-independent quantum key distribution, attacks presented in (1) show that security can be compromised if the same devices are used to implement another instance of the protocol.
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|Christiandl2005, Lipinska2018, Yang2016]] and untrusted [[Quantum Anonymous Transmission#References|Brassard2007]].
#[https://arxiv.org/abs/1409.3525 PR (2014)] discusses security of various QKD schemes composed in other cryptographic protocols.
#
#[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.110.010503 BCK (2013)] Analyses device independent QKD
 


<div style='text-align: right;'>''*contributed by Victoria Lipinska''</div>
<div style='text-align: right;'>''*contributed by Victoria Lipinska''</div>
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu