We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

Abstract: When there exists a malicious attacker in the network, we need to be careful of eavesdropping and contamination. This problem is crucial for network communication when the network is realized by a partially trusted relay of quantum key distribution. We discuss the asymptotic rate in a linear network with the secrecy and robustness conditions when the above type of attacker exists. Also, under the same setting, we discuss the asymptotic rate in a linear network when we impose the secrecy condition alone. Then, we apply these results to the network composed of a partially trusted relay of quantum key distribution, which enables us to realize secure long-distance communication via short-distance quantum key distribution.
Comments: arXiv admin note: text overlap with arXiv:1703.00723
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
Cite as: arXiv:2003.12225 [cs.IT]
  (or arXiv:2003.12225v1 [cs.IT] for this version)

Submission history

From: Masahito Hayashi [view email]
[v1] Fri, 27 Mar 2020 03:49:55 GMT (47kb,D)

Link back to: arXiv, form interface, contact.