<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
FOS: Computer and information sciences, Quantum Physics, Computer Science - Cryptography and Security, Computer Science - Information Theory, Information Theory (cs.IT), FOS: Physical sciences, Quantum Physics (quant-ph), Cryptography and Security (cs.CR)
FOS: Computer and information sciences, Quantum Physics, Computer Science - Cryptography and Security, Computer Science - Information Theory, Information Theory (cs.IT), FOS: Physical sciences, Quantum Physics (quant-ph), Cryptography and Security (cs.CR)
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 100 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 1% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 1% | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |