arXiv Analytics

Sign in

arXiv:quant-ph/9810021AbstractReferencesReviewsResources

Improvement of quantum key distribution protocols

Guihua Zeng

Published 1998-10-07Version 1

The security of the previous quantum key distribution protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, the impersonation of Alice or Bob by eavesdropper, in practice. will be existed in a large probability. In this paper an improvement scheme for the security quantum key is proposed.

Related articles: Most relevant | Search more
arXiv:1704.08169 [quant-ph] (Published 2017-04-26)
Noisy entanglement-assisted classical capacity as a security framework for two-way quantum key distribution protocols
arXiv:2111.04351 [quant-ph] (Published 2021-11-08)
Receiver-Device-Independent Quantum Key Distribution Protocols
arXiv:1106.2754 [quant-ph] (Published 2011-06-14)
Double blinding-attack on entanglement-based quantum key distribution protocols