메뉴 건너뛰기




Volumn 49, Issue 2, 2003, Pages 457-475

Proof of security of quantum key distribution with two-way classical communications

Author keywords

Cryptography; Key distribution; Quantum cryptography; Quantum information; Quantum information processing

Indexed keywords

DATA PRIVACY; DATA PROCESSING; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0037319628     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2002.807289     Document Type: Article
Times cited : (304)

References (35)
  • 1
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
    • H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography," Phys. Rev., vol. A59, p. 4238, 1999.
    • (1999) Phys. Rev. , vol.A59 , pp. 4238
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 6
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss, "Optimal eavesdropping in quantum cryptography with six states," Phys. Rev. Lett., vol. 81, p. 3018, 1998.
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018
    • Bruss, D.1
  • 7
    • 0041633351 scopus 로고    scopus 로고
    • Coherent eavesdropping strategies for the 4-state quantum cryptography protocol
    • I. Cirac and N. Gisin, "Coherent eavesdropping strategies for the 4-state quantum cryptography protocol," Phys. Lett., vol. A229, p. 1, 1997.
    • (1997) Phys. Lett. , vol.A229 , pp. 1
    • Cirac, I.1    Gisin, N.2
  • 8
    • 6144265213 scopus 로고    scopus 로고
    • Quantum privacy amplification and the security of quantum cryptography over noisy channels
    • Erratum in Phys. Rev. Lett., vol. 80, p. 2022, 1998
    • D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Phys. Rev. Lett., vol. 77, p. 2818, 1996. Erratum in Phys. Rev. Lett., vol. 80, p. 2022, 1998.
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 2818
    • Deutsch, D.1    Ekert, A.2    Jozsa, R.3    Macchiavello, C.4    Popescu, S.5    Sanpera, A.6
  • 9
    • 0000286896 scopus 로고    scopus 로고
    • Quantum channel capacity of very noisy channels
    • [Online]
    • D. P. DiVincenzo, P. W. Shor, and J. A. Smolin, "Quantum channel capacity of very noisy channels," Phys. Rev. A, vol. 57, p. 830, 1998. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9706061.
    • (1998) Phys. Rev. A , vol.57 , pp. 830
    • DiVincenzo, D.P.1    Shor, P.W.2    Smolin, J.A.3
  • 10
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett., vol. 67, p. 661, 1991.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.K.1
  • 11
  • 12
    • 0036013605 scopus 로고    scopus 로고
    • Quantum cryptography
    • [Online]
    • N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol. 74, pp. 145-195. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0101098.
    • Rev. Mod. Phys. , vol.74 , pp. 145-195
    • Gisin, N.1    Ribordy, G.2    Tittel, W.3    Zbinden, H.4
  • 14
    • 0001872185 scopus 로고    scopus 로고
    • From quantum cheating to quantum security
    • Nov., [Online]
    • D. Gottesman and H.-K. Lo, "From quantum cheating to quantum security," Phys. Today, vol. 53, no. 11, p. 22, Nov. 2000. Also, [Online]. Available: http://www.physicstoday.org/pt/vol-53/iss-11/p22.html.
    • (2000) Phys. Today , vol.53 , Issue.11 , pp. 22
    • Gottesman, D.1    Lo, H.-K.2
  • 15
    • 0141771056 scopus 로고    scopus 로고
    • Secure quantum key distribution using squeezed states
    • D. Gottesman and J. Preskill, "Secure quantum key distribution using squeezed states," Phys. Rev., vol. A63, p. 22309, 2001.
    • (2001) Phys. Rev. , vol.A63 , pp. 22309
    • Gottesman, D.1    Preskill, J.2
  • 17
    • 0002863426 scopus 로고
    • Bounds for the quantity of information transmitted by a quantum communication channel
    • A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum communication channel," Probl. Inform. Transm. (U.S.S.R.), vol. 9, p. 177, 1973.
    • (1973) Probl. Inform. Transm. (U.S.S.R.) , vol.9 , pp. 177
    • Holevo, A.S.1
  • 22
    • 0013207242 scopus 로고    scopus 로고
    • Proof of unconditional security of six-state quantum key distribution scheme
    • [Online]
    • H.-K. Lo, "Proof of unconditional security of six-state quantum key distribution scheme," Quant. Inform. Comput. (QIC), vol. 1, no. 2, pp. 81-94, 2001. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0102138.
    • (2001) Quant. Inform. Comput. (QIC) , vol.1 , Issue.2 , pp. 81-94
    • Lo, H.-K.1
  • 23
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • [Online]
    • H.-K. Lo and H. F. Chau, "Unconditional security of quantum key distribution over arbitrarily long distances," Science, vol. 283, pp. 2050-2056, 1999. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9803006.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 27
    • 0001619342 scopus 로고    scopus 로고
    • Estimates for practical quantum cryptography
    • N. Lütkenhaus, "Estimates for practical quantum cryptography," Phys. Rev., vol. A59, p. 3301, 1999.
    • (1999) Phys. Rev. , vol.A59 , pp. 3301
    • Lütkenhaus, N.1
  • 29
    • 78149248764 scopus 로고
    • Protocols for secret key agreement by public discussion based on common information
    • New York: Springer-Verlag
    • U. M. Maurer, "Protocols for secret key agreement by public discussion based on common information," in Advances in Cryptology-Proc. Crypto' 92. New York: Springer-Verlag, 1993, vol. 740, pp. 461-470.
    • (1993) Advances in Cryptology-Proc. Crypto' 92 , vol.740 , pp. 461-470
    • Maurer, U.M.1
  • 30
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • _, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, p. 733, 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733
  • 31
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic information
    • Mar.
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 32
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • [Online]
    • D. Mayers, "Unconditional security in Quantum Cryptography," J. Assoc. Comput. Mach., vol. 48, no. 3, pp. 351-406. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/9802025.
    • J. Assoc. Comput. Mach. , vol.48 , Issue.3 , pp. 351-406
    • Mayers, D.1
  • 33
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • [Online]
    • P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, p. 441, 2000. Also, [Online]. Available: http://xxx.lanl.gov/abs/quant-ph/0003004.
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 34
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner, "Conjugate coding," Sigact News, vol. 15, no. 1, p. 78, 1983.
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78
    • Wiesner, S.1
  • 35
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • New York: Springer-Verlag
    • D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channels," in Advances in Cryptology-Proc. Crypto'96. New York: Springer-Verlag, 1996, p. 343.
    • (1996) Advances in Cryptology-Proc. Crypto'96 , pp. 343
    • Mayers, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.