Quantum Cryptography and Post-Quantum Cryptography
Motivation and Principles
Bell Test Requirements
Loophole-Free Bell Tests
Security Analysis
Protocol Description
Security Advantages
Implementation Requirements
Principles and Protocols
Unforgeable Quantum Signatures
Non-Repudiation Properties
Implementation Challenges
Threshold Secret Sharing
Quantum Access Structures
Verifiable Secret Sharing
Cheating Strategies
Optimal Protocols
Protocol Variants
Security Properties
Impossibility Results
Previous
6. QKD Security Analysis
Go to top
Next
8. Post-Quantum Cryptography Foundations