메뉴 건너뛰기




Volumn 4917, Issue , 2002, Pages 106-111

A quantum three-pass cryptography protocol

Author keywords

Protocol; Quantum cryptography; Security analysis

Indexed keywords

ALGORITHMS; LIGHT POLARIZATION; LIGHT TRANSMISSION; PHOTONS; QUANTUM CRYPTOGRAPHY;

EID: 0036442155     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.483035     Document Type: Conference Paper
Times cited : (13)

References (10)
  • 2
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner, "Conjugate coding", Sigact News, 15, pp. 78-88, 1983.
    • (1983) Sigact News , vol.15 , pp. 78-88
    • Wiesner, S.1
  • 3
    • 11944254075 scopus 로고
    • Quantum cryptography using two nonorthogonal states
    • C.H. Bennett, "Quantum cryptography using two nonorthogonal states", Phys. Rev. Lett. 68, pp. 3121-3124, 1992.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 4
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's thoerem
    • A. Ekert, "Quantum cryptography based on Bell's thoerem", Phys. Rev. Lett. 67, pp.661-663, 1991.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.1
  • 5
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss, "Optimal eavesdropping in quantum cryptography with six states", Phys. Rev. Lett. 81, pp.3018-3021
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018-3021
    • Bruss, D.1
  • 6
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
    • H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and Coherent Eavesdropping in the 6-State Protocol of Quantum Cryptography", Phys. Rev. A 59, 4238-4248, 1999.
    • (1999) Phys. Rev. A , vol.59 , pp. 4238-4248
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 7
    • 4243882278 scopus 로고
    • On the problem of hidden variables in quantum mechanics
    • J. S. Bell, "On the problem of hidden variables in quantum mechanics", Rev. Mod. Phys., 38, pp. 447-452, 1964.
    • (1964) Rev. Mod. Phys. , vol.38 , pp. 447-452
    • Bell, J.S.1
  • 8
    • 4243698745 scopus 로고    scopus 로고
    • Transmit classical and quantum information secretly
    • e-print arXiv: quant-ph/0203089
    • L. Yang and L. A. Wu, "Transmit Classical and Quantum Information Secretly", e-print arXiv: quant-ph/0203089
    • Yang, L.1    Wu, L.A.2
  • 9
    • 0003855464 scopus 로고    scopus 로고
    • Protocols, algorithms, and source codes in C
    • John Wiley & Sons, New York
    • B. Schneier, Applied Cryptography (2nd Edition): "Protocols, algorithms, and source codes in C", John Wiley & Sons, New York, 1996.
    • (1996) Applied Cryptography (2nd Edition)
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.