메뉴 건너뛰기




Volumn 67, Issue 3, 2003, Pages

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); DATA PRIVACY; EIGENVALUES AND EIGENFUNCTIONS; MATRIX ALGEBRA; NETWORK PROTOCOLS; OPTIMIZATION; PHOTONS; POLARIZATION; QUANTUM CRYPTOGRAPHY; SIGNAL ENCODING; SPURIOUS SIGNAL NOISE;

EID: 0038514019     PISSN: 10502947     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (22)

References (29)
  • 7
    • 0038412847 scopus 로고    scopus 로고
    • e-print quant-ph/9803006
    • H.-K. Lo and H.F. Chau, e-print quant-ph/9803006.
    • Lo, H.-K.1    Chau, H.F.2
  • 8
    • 0038074446 scopus 로고    scopus 로고
    • e-print quant-ph/9802025
    • D. Mayers, e-print quant-ph/9802025.
    • Mayers, D.1
  • 15
    • 0038750957 scopus 로고    scopus 로고
    • e-print quant-ph/0102138
    • H.-K. Lo, e-print quant-ph/0102138.
    • Lo, H.-K.1
  • 21
    • 0038074445 scopus 로고    scopus 로고
    • J. Preskill, http://www.theory.caltech.edu/people/preskill/ph229/
    • Preskill, J.1
  • 24
    • 0002612922 scopus 로고
    • edited by V.P. Belavkin, O. Hirota, and R. Hudson (Plenum, New York)
    • L.B. Levitin, in Quantum Communication and Measurement, edited by V.P. Belavkin, O. Hirota, and R. Hudson (Plenum, New York, 1995), pp. 439-448.
    • (1995) Quantum Communication and Measurement , pp. 439-448
    • Levitin, L.B.1
  • 25
    • 85088488607 scopus 로고    scopus 로고
    • note
    • c> is also maximized by the symmetric von Neumann measurement.
  • 26
    • 0038750955 scopus 로고    scopus 로고
    • note
    • In general, there exist correlations among α′, α, θ, and ε. But since we can calculate Eve's information gain for any α′, α, T, θ, and ε, even if such a correlation exists, Alice and Bob can maximize the secret key gain by taking this correlation into consideration.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.