pith. machine review for the scientific record. sign in

arxiv: quant-ph/0512258 · v2 · submitted 2005-12-30 · 🪐 quant-ph

Recognition: unknown

Security of Quantum Key Distribution

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords quantumdistributionsecurityapplicationappliesarbitraryfinettifinite
0
0 comments X
read the original abstract

We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Unconditional Authentication in Quantum Key Distribution via Hybrid Entangled Physical Unclonable Functions

    quant-ph 2026-05 unverdicted novelty 5.0

    Hybrid entangled PUFs generate an ITS initial authentication key, allowing a complete entanglement-based QKD protocol without pre-shared secrets under minimal hardware assumptions.