related words |
tamaki |
authentic |
partys |
bessette |
malicious |
preskills |
sealing |
randomize |
breeding |
achievability |
nordholt |
intercepted |
secrets |
buttler |
attacker |
password |
decrypt |
cheaters |
authenticate |
vernam |
|
related documents |
Security Trade-offs in Ancilla-Free Quantum Bit Commitment in the
Presence of Superselection Rules [0405111v2] |
Cheat Sensitive Quantum Bit Commitment [9911043v5] |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols [0510230v3] |
Unambiguous discrimination of special sets of multipartite states using
local measurements and classical communication [0501174v1] |
|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{algorithm, log, probability} |
{states, state, optimal} |
{group, space, representation} |
{information, entropy, channel} |
{photon, photons, single} |
{bell, inequality, local} |
{let, theorem, proof} |
{error, code, errors} |
{theory, mechanics, state} |
{vol, operators, histories} |
{state, phys, rev} |
{observables, space, algebra} |
{energy, gaussian, time} |
{state, states, entangled} |
{field, particle, equation} |
{cavity, atom, atoms} |
{classical, space, random} |
{light, field, probe} |
|