Analysis and Comparison of Security Proofs of Quantum Key Distribution
碩士 === 國立臺灣大學 === 電機工程學研究所 === 106 === Quantum key distribution (QKD) allows two parties to have a shared secret key without relying on any computational assumption. While BB84 is the oldest QKD protocol, it is easy to implement and compatible with decoy-method, which makes it secure in the practica...
Main Authors: | Hao Chung, 鍾豪 |
---|---|
Other Authors: | 鄭振牟 |
Format: | Others |
Language: | en_US |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/9pc3ky |
Similar Items
-
The Physical Underpinning of Security Proofs for Quantum Key Distribution
by: Boileau, Jean Christian
Published: (2007) -
Security proof methods for quantum key distribution protocols
by: Ferenczi, Agnes
Published: (2013) -
The Physical Underpinning of Security Proofs for Quantum Key Distribution
by: Boileau, Jean Christian
Published: (2007) -
Security proof methods for quantum key distribution protocols
by: Ferenczi, Agnes
Published: (2013) -
Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions
by: Abidin, Aysajan
Published: (2013)