Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.
Title resolution pending
2 Pith papers cite this work. Polarity classification is still indexing.
citation-role summary
citation-polarity summary
fields
quant-ph 2years
2026 2verdicts
UNVERDICTED 2roles
method 1polarities
use method 1representative citing papers
QRQT protects quantum teleportation's classical channel with PQC, showing quantum memory coherence as the central bottleneck that caps secure distance at 191-199 km and produces a non-monotonic joint attack probability.
citing papers explorer
-
Rigorous Security Proofs for Practical Quantum Key Distribution
Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.
-
Quantum-Resistant Quantum Teleportation
QRQT protects quantum teleportation's classical channel with PQC, showing quantum memory coherence as the central bottleneck that caps secure distance at 191-199 km and produces a non-monotonic joint attack probability.