메뉴 건너뛰기




Volumn 5, Issue 1, 1992, Pages 3-28

Experimental quantum cryptography

Author keywords

Key distribution; Polarized light; Privacy amplification; Public discussion; Quantum cryptography; Reconciliation protocols; Uncertainty principle; Unconditional security

Indexed keywords

DATA PROCESSING - SECURITY OF DATA; QUANTUM THEORY - APPLICATIONS;

EID: 0026626314     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00191318     Document Type: Article
Times cited : (1784)

References (27)
  • 3
    • 84934374492 scopus 로고    scopus 로고
    • Bennett, C. H. and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, December 1984, pp. 175–179.
  • 6
    • 84934374494 scopus 로고    scopus 로고
    • Bennett, C. H., G. Brassard, and S. Breidbart, Quantum cryptography II: How to re-use a one-time pad safely even if P= NP, unpublished manuscript available from the authors, November 1982.
  • 8
    • 84934374484 scopus 로고    scopus 로고
    • Bennett, C. H., G. Brassard, C. Crépeau, and M.-H. Skubiszewska, Practical quantum oblivious transfer, Advances in Cryptology—Crypto '91 Proceedings (to appear).
  • 9
    • 84934374485 scopus 로고    scopus 로고
    • Bennett, C. H., G. Brassard, C. Crépeau, and U. M. Maurer, Privacy amplification against probabilistic information, in preparation.
  • 10
    • 84934374483 scopus 로고    scopus 로고
    • Bennett, C. H., G. Brassard, and N. D. Mermin, Quantum cryptography without Bell's theorem and without Einstein-Podolsky-Rosen states, Physical Review Letters (to appear).
  • 14
    • 84934374482 scopus 로고    scopus 로고
    • Brassard, G. and C. Crépeau, Quantum bit commitment and coin tossing protocols, Advances in Cryptology—Crypto '90 Proceedings (to appear).
  • 16
    • 84934374481 scopus 로고    scopus 로고
    • Crépeau, C., Correct and private reductions among oblivious transfers, PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, February 1990.
  • 17
    • 84934374480 scopus 로고    scopus 로고
    • Crépeau, C. and J. Kilian, Achieving oblivious transfer using weakened security assumptions, Proceedings of 29th IEEE Symposium on the Foundations of Computer Science, White Plains, New York, October 1988, pp. 42–52.
  • 18
    • 84934374479 scopus 로고    scopus 로고
    • Deutsch, D., Quantum communication thwarts eavesdroppers, New Scientist, 9 December, 1989, pp. 25–26.
  • 20
  • 21
    • 84934374478 scopus 로고    scopus 로고
    • Impagliazzo, R. and D. Zuckerman, How to Recycle Random Bits, Proceedings of 30th IEEE Symposium on the Foundations of Computer Science, Research Triangle Park, North Carolina, October 1989, pp. 248–253.
  • 22
    • 84934374477 scopus 로고    scopus 로고
    • Léger, C., personal communication.
  • 27
    • 84934374476 scopus 로고    scopus 로고
    • Wiesner, S., Conjugate coding, manuscript written circa 1970, unpublished until it appeared in Sigact News, Vol. 15, no. 1, 1983, pp. 78–88.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.