Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2009)
New J
(2005)
Proceedings of the Royal Society A 461
(1984)
in Proceedings of IEEE International Conference on Computers
(1709)
Nanoscale Research Letters 12
Nikolay Raychev, I. Chuang (2010)
Quantum Computation and Quantum Information: Bibliography
(1998)
Electr
A. Odlyzko (1987)
Proceedings on Advances in cryptology---CRYPTO '86
Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncertainty relation, and only a few assumptions need to be made about the devices used in the protocol. We also show that a two-way protocol can outperform comparable one-way protocols.
Physical Review A – American Physical Society (APS)
Published: Dec 2, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.