Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Quantum key distribution secure against partly malicious devices

Not Accessible

Your library or personal account may give you access

Abstract

We show that using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of quantum key distribution against covert channels and partly malicious classical post-processing units.

© 2017 Optical Society of America

PDF Article
More Like This
Composable Security Analysis for Continuous Variable Measurement-Device-Independent Quantum Key Distribution

Yichen Zhang, Zhengyu Li, Song Yu, and Hong Guo
JW4A.33 Frontiers in Optics (FiO) 2017

Device-Independent Quantum Key Distribution

Antonio Acin
FF1A.1 CLEO: QELS_Fundamental Science (CLEO:FS) 2015

Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.