Home
  • English
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Log In
    New user? Click here to register. Have you forgotten your password?
Home
  • Browse Our Collections
  • Publications
  • Researchers
  • Research Data
  • Institutions
  • Statistics
    • English
    • ÄŒeÅ¡tina
    • Deutsch
    • Español
    • Français
    • Gàidhlig
    • LatvieÅ¡u
    • Magyar
    • Nederlands
    • Português
    • Português do Brasil
    • Suomi
    • Log In
      New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Research Output and Publications
  3. Faculty of Electronic Engineering & Technology (FKTEN)
  4. Conference Publications
  5. Security of B92 protocol with uninformative states in asymptotic limit with composable security
 
Options

Security of B92 protocol with uninformative states in asymptotic limit with composable security

Journal
AIP Conference Proceedings
ISSN
0094-243X
Date Issued
2020
Author(s)
Norshamsuri Ali @ Hasim
Universiti Malaysia Perlis
N. A. N. Mat Radzi
Universiti Malaysia Perlis
Syed Alwee Aljunid Syed Junid
Universiti Malaysia Perlis
Rosdisham Endut
Universiti Malaysia Perlis
DOI
10.1063/1.5142141
Handle (URI)
https://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/1.5142141/14205269/020049_1_online.pdf
https://pubs.aip.org/aip/acp/
https://hdl.handle.net/20.500.14170/15387
Abstract
The security of the Quantum Key Distribution (QKD) is coming from the fundamental principle of quantum physic where any action on the quantum system that tries to extract the information will be considered generally as a measurement which basically will modify the system. The protocol of B92 has been proven unconditionally secure by various of study based on the entanglement distillation protocol (EDP) technique. However, based on this technique it does not prove composable security which is actually important in privacy amplification in order to guarantee the partial key shared cannot revoke the security of the system. We review the security analysis of this system and its implementation in this work.
File(s)
Security of B92 protocol with uninformative states.pdf (1.27 MB)
Views
1
Acquisition Date
Mar 5, 2026
View Details
Downloads
7
Last Month
1
Acquisition Date
Mar 5, 2026
View Details
google-scholar
  • About Us
  • Contact Us
  • Policies