메뉴 건너뛰기




Volumn 37, Issue 14, 1998, Pages 2869-2878

Defense frontier analysis of quantum cryptographic systems

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; AMPLIFICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); DATA COMMUNICATION SYSTEMS; ERROR CORRECTION; PHOTONS; PROBABILITY; QUANTUM OPTICS; SECURITY OF DATA; SPURIOUS SIGNAL NOISE;

EID: 0032073168     PISSN: 1559128X     EISSN: 21553165     Source Type: Journal    
DOI: 10.1364/AO.37.002869     Document Type: Article
Times cited : (29)

References (17)
  • 2
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bells theorem
    • A. K. Ekert, “Quantum cryptography based on Bell’s theorem, ” Phys. Rev. Lett. 67, 661-663 (1991).
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 3
    • 11944263767 scopus 로고
    • Quantum cryptography without Bells theorem
    • C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem, ” Phys. Rev. Lett. 68, 557-559 (1992).
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 5
    • 11944254075 scopus 로고
    • Quantum cryptography using any two non-orthogonal states
    • C. H. Bennett, “Quantum cryptography using any two non-orthogonal states, ” Phys. Rev. Lett. 68, 3121-3124 (1992).
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 6
    • 0001082184 scopus 로고    scopus 로고
    • Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
    • B. Slutsky, P. C. Sun, Y. Mazurenko, R. Rao, and Y. Fainaman, “Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, ” J. Mod. Opt. 44, 953-961 (1997).
    • (1997) J. Mod. Opt. , vol.44 , pp. 953-961
    • Slutsky, B.1    Sun, P.C.2    Mazurenko, Y.3    Rao, R.4    Fainaman, Y.5
  • 7
    • 0001452279 scopus 로고    scopus 로고
    • Security of quantum cryptography against collective attacks
    • E. Biham and T. Mor, “Security of quantum cryptography against collective attacks, ” Phys. Rev. Lett. 78, 2256-2259 (1997).
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 2256-2259
    • Biham, E.1    Mor, T.2
  • 8
    • 0031273993 scopus 로고    scopus 로고
    • Bounds on information and the security of quantum cryptography
    • E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography, ” Phys. Rev. Lett 79, 4034-4037 (1997).
    • (1997) Phys. Rev. Lett , vol.79 , pp. 4034-4037
    • Biham, E.1    Mor, T.2
  • 9
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • N. Kobitz, ed., Vol. 1109 of Springer Lecture Notes in Computer Science Series, Springer, New York
    • D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels, ” in Advances in Cryptology, CRYPTO’96, N. Kobitz, ed., Vol. 1109 of Springer Lecture Notes in Computer Science Series (Springer, New York, 1996), pp. 343-357.
    • (1996) Advances in Cryptology, CRYPTO’96 , pp. 343-357
    • Mayers, D.1
  • 11
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • B. Huttner, N. Imoto, N. Gisin, and T. Mor, “Quantum cryptography with coherent states, ” Phys. Rev. A 51, 1863-1869 (1995).
    • (1995) Phys. Rev. A , vol.51 , pp. 1863-1869
    • Huttner, B.1    Imoto, N.2    Gisin, N.3    Mor, T.4
  • 12
    • 0001020515 scopus 로고    scopus 로고
    • Quantum amplifiers, quantum duplicators, and quantum cryptography, Quantum Semiclass
    • H. Yuen, “Quantum amplifiers, quantum duplicators, and quantum cryptography, ” Quantum Semiclass. Opt. 8, 939-949 (1996).
    • (1996) Opt. , vol.8 , pp. 939-949
    • Yuen, H.1
  • 13
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • C. Cachin and U. M. Maurer, “Linking information reconciliation and privacy amplification, ” J. Cryptol. 10, 97-110 (1997).
    • (1997) J. Cryptol. , vol.10 , pp. 97-110
    • Cachin, C.1    Maurer, U.M.2
  • 14
    • 0001328001 scopus 로고    scopus 로고
    • Quantum-state disturbance versus information gain: Uncertainty relations for quantum information
    • C. A. Fuchs and A. Peres, “Quantum-state disturbance versus information gain: uncertainty relations for quantum information, ” Phys. Rev. A 53, 2038-2045 (1996).
    • (1996) Phys. Rev. A , vol.53 , pp. 2038-2045
    • Fuchs, C.A.1    Peres, A.2
  • 15
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
    • C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, “Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy, ” Phys. Rev. A 56, 1163-1172 (1997).
    • (1997) Phys. Rev. A , vol.56 , pp. 1163-1172
    • Fuchs, C.A.1    Gisin, N.2    Griffiths, R.B.3    Niu, C.-S.4    Peres, A.5
  • 16
    • 85010120677 scopus 로고    scopus 로고
    • Security of quantum cryptography against individual attacks
    • to be published
    • B. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, “Security of quantum cryptography against individual attacks, ” Phys. Rev. A (to be published).
    • Phys. Rev. A
    • Slutsky, B.1    Rao, R.2    Sun, P.-C.3    Fainman, Y.4
  • 17
    • 0000515658 scopus 로고
    • Eavesdropping on quantum cryptographical systems
    • A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, “Eavesdropping on quantum cryptographical systems, ” Phys. Rev. A 50, 1047-1056 (1994).
    • (1994) Phys. Rev. A , vol.50 , pp. 1047-1056
    • Ekert, A.K.1    Huttner, B.2    Palma, G.M.3    Peres, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.