-
1
-
-
0001293325
-
Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
-
H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography," Phys. Rev., vol. A59, p. 4238, 1999.
-
(1999)
Phys. Rev.
, vol.A59
, pp. 4238
-
-
Bechmann-Pasquinucci, H.1
Gisin, N.2
-
2
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
New York: IEEE Tress
-
C.H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Computers, Systems, and Signal Processing. New York: IEEE Tress, 1984, p. 175.
-
(1984)
Proc. IEEE Int. Conf. Computers, Systems, and Signal Processing
, pp. 175
-
-
Bennett, C.H.1
Brassard, G.2
-
3
-
-
4243216277
-
Mixed state entanglement and quantum error correction
-
C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, "Mixed state entanglement and quantum error correction," Phys. Rev., vol. A54, p. 3824, 1996.
-
(1996)
Phys. Rev.
, vol.A54
, pp. 3824
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
5
-
-
0033702887
-
A proof of the security of quantum key distribution
-
New York: ACM Press
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, "A proof of the security of quantum key distribution," in Proc. 32nd Annu. ACM Symp. Theory of Computing (STOC). New York: ACM Press, 2000, p. 715.
-
(2000)
Proc. 32nd Annu. ACM Symp. Theory of Computing (STOC)
, pp. 715
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
6
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
D. Bruss, "Optimal eavesdropping in quantum cryptography with six states," Phys. Rev. Lett., vol. 81, p. 3018, 1998.
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3018
-
-
Bruss, D.1
-
7
-
-
0041633351
-
Coherent eavesdropping strategies for the 4-state quantum cryptography protocol
-
I. Cirac and N. Gisin, "Coherent eavesdropping strategies for the 4-state quantum cryptography protocol," Phys. Lett., vol. A229, p. 1, 1997.
-
(1997)
Phys. Lett.
, vol.A229
, pp. 1
-
-
Cirac, I.1
Gisin, N.2
-
8
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
Erratum in Phys. Rev. Lett., vol. 80, p. 2022, 1998
-
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Phys. Rev. Lett., vol. 77, p. 2818, 1996. Erratum in Phys. Rev. Lett., vol. 80, p. 2022, 1998.
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
9
-
-
0000286896
-
Quantum channel capacity of very noisy channels
-
[Online]
-
D. P. DiVincenzo, P. W. Shor, and J. A. Smolin, "Quantum channel capacity of very noisy channels," Phys. Rev. A, vol. 57, p. 830, 1998. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9706061.
-
(1998)
Phys. Rev. A
, vol.57
, pp. 830
-
-
DiVincenzo, D.P.1
Shor, P.W.2
Smolin, J.A.3
-
10
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett., vol. 67, p. 661, 1991.
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
11
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography. I
-
C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu, and A. Peres, "Optimal eavesdropping in quantum cryptography. I," Phys. Rev., vol. A56, p. 1163, 1997.
-
(1997)
Phys. Rev.
, vol.A56
, pp. 1163
-
-
Fuchs, C.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.S.4
Peres, A.5
-
12
-
-
0036013605
-
Quantum cryptography
-
[Online]
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol. 74, pp. 145-195. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0101098.
-
Rev. Mod. Phys.
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
14
-
-
0001872185
-
From quantum cheating to quantum security
-
Nov., [Online]
-
D. Gottesman and H.-K. Lo, "From quantum cheating to quantum security," Phys. Today, vol. 53, no. 11, p. 22, Nov. 2000. Also, [Online]. Available: http://www.physicstoday.org/pt/vol-53/iss-11/p22.html.
-
(2000)
Phys. Today
, vol.53
, Issue.11
, pp. 22
-
-
Gottesman, D.1
Lo, H.-K.2
-
15
-
-
0141771056
-
Secure quantum key distribution using squeezed states
-
D. Gottesman and J. Preskill, "Secure quantum key distribution using squeezed states," Phys. Rev., vol. A63, p. 22309, 2001.
-
(2001)
Phys. Rev.
, vol.A63
, pp. 22309
-
-
Gottesman, D.1
Preskill, J.2
-
17
-
-
0002863426
-
Bounds for the quantity of information transmitted by a quantum communication channel
-
A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum communication channel," Probl. Inform. Transm. (U.S.S.R.), vol. 9, p. 177, 1973.
-
(1973)
Probl. Inform. Transm. (U.S.S.R.)
, vol.9
, pp. 177
-
-
Holevo, A.S.1
-
21
-
-
0037177529
-
-
report, (DOI: 10.1126/science. 1068972)
-
A. Lamas-Linares, C. Simon, J. C. Howell, and D. Bouwmeester, "Science," report, (DOI: 10.1126/science. 1068972).
-
Science
-
-
Lamas-Linares, A.1
Simon, C.2
Howell, J.C.3
Bouwmeester, D.4
-
22
-
-
0013207242
-
Proof of unconditional security of six-state quantum key distribution scheme
-
[Online]
-
H.-K. Lo, "Proof of unconditional security of six-state quantum key distribution scheme," Quant. Inform. Comput. (QIC), vol. 1, no. 2, pp. 81-94, 2001. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0102138.
-
(2001)
Quant. Inform. Comput. (QIC)
, vol.1
, Issue.2
, pp. 81-94
-
-
Lo, H.-K.1
-
23
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
[Online]
-
H.-K. Lo and H. F. Chau, "Unconditional security of quantum key distribution over arbitrarily long distances," Science, vol. 283, pp. 2050-2056, 1999. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9803006.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
26
-
-
0003482738
-
-
Singapore: Word Scientific. Hardcover, paperback
-
H.-K. Lo, S. Popescu, and T. Spiller, Introduction to Quantum Computation and Information. Singapore: Word Scientific. Hardcover 1998, paperback 2001, 364 pp.
-
(1998)
Introduction to Quantum Computation and Information
, pp. 364
-
-
Lo, H.-K.1
Popescu, S.2
Spiller, T.3
-
27
-
-
0001619342
-
Estimates for practical quantum cryptography
-
N. Lütkenhaus, "Estimates for practical quantum cryptography," Phys. Rev., vol. A59, p. 3301, 1999.
-
(1999)
Phys. Rev.
, vol.A59
, pp. 3301
-
-
Lütkenhaus, N.1
-
29
-
-
78149248764
-
Protocols for secret key agreement by public discussion based on common information
-
New York: Springer-Verlag
-
U. M. Maurer, "Protocols for secret key agreement by public discussion based on common information," in Advances in Cryptology-Proc. Crypto' 92. New York: Springer-Verlag, 1993, vol. 740, pp. 461-470.
-
(1993)
Advances in Cryptology-Proc. Crypto' 92
, vol.740
, pp. 461-470
-
-
Maurer, U.M.1
-
30
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
_, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, p. 733, 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733
-
-
-
31
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic information
-
Mar.
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
32
-
-
3042730516
-
Unconditional security in quantum cryptography
-
[Online]
-
D. Mayers, "Unconditional security in Quantum Cryptography," J. Assoc. Comput. Mach., vol. 48, no. 3, pp. 351-406. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9802025.
-
J. Assoc. Comput. Mach.
, vol.48
, Issue.3
, pp. 351-406
-
-
Mayers, D.1
-
33
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
[Online]
-
P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, p. 441, 2000. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0003004.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
34
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, "Conjugate coding," Sigact News, vol. 15, no. 1, p. 78, 1983.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78
-
-
Wiesner, S.1
-
35
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
New York: Springer-Verlag
-
D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channels," in Advances in Cryptology-Proc. Crypto'96. New York: Springer-Verlag, 1996, p. 343.
-
(1996)
Advances in Cryptology-Proc. Crypto'96
, pp. 343
-
-
Mayers, D.1
|