pith. sign in

arxiv: quant-ph/0512258 · v2 · submitted 2005-12-30 · 🪐 quant-ph

Security of Quantum Key Distribution

classification 🪐 quant-ph
keywords quantumdistributionsecurityapplicationappliesarbitraryfinettifinite
0
0 comments X p. Extension
read the original abstract

We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Finite-size quantum key distribution rates from R\'enyi entropies using conic optimization

    quant-ph 2025-11 unverdicted novelty 7.0

    A general conic optimization solver computes finite-size QKD rates from Rényi entropies more reliably than prior Frank-Wolfe methods.

  2. Unconditional Authentication in Quantum Key Distribution via Hybrid Entangled Physical Unclonable Functions

    quant-ph 2026-05 unverdicted novelty 5.0

    Hybrid entangled PUFs generate an ITS initial authentication key, allowing a complete entanglement-based QKD protocol without pre-shared secrets under minimal hardware assumptions.