-
1
-
-
0033702887
-
A proof of security of quantum key distribution against any attack
-
ACM Press, New York
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, A proof of security of quantum key distribution against any attack, in Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing (STOC '00), ACM Press, New York, 2000, pp. 715-724. The full paper was submitted to Journal of Cryptology. See also the Los Alamos archive Quant-ph 9912053.
-
(2000)
Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing (STOC '00)
, pp. 715-724
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
2
-
-
0033702887
-
-
See also the Los Alamos archive Quant-ph 9912053
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, A proof of security of quantum key distribution against any attack, in Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing (STOC '00), ACM Press, New York, 2000, pp. 715-724. The full paper was submitted to Journal of Cryptology. See also the Los Alamos archive Quant-ph 9912053.
-
Journal of Cryptology
-
-
-
3
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, Conjugate coding, Sigact News, 15 (1983), 77-88.
-
(1983)
Sigact News
, vol.15
, pp. 77-88
-
-
Wiesner, S.1
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE Press, New York
-
C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bengalore, India, IEEE Press, New York, 1984, pp. 175-179.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bengalore, India
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
0002977948
-
Quantum cryptography
-
Oct.
-
C. H. Bennett, G. Brassard, and A. Ekert, Quantum cryptography, Sci. Amer., 267 (Oct. 1992), 50-57.
-
(1992)
Sci. Amer.
, vol.267
, pp. 50-57
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.3
-
6
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
A. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett., 67 (1991), 661-663.
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.1
-
7
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett., 68 (1992), 3121-3124.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
8
-
-
0343536431
-
Limitations of practical quantum cryptography
-
G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, Limitations of practical quantum cryptography, Phys. Rev. Lett., 85 (2000), 1330-1333.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 1330-1333
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
9
-
-
17544370938
-
Parity bit in quantum cryptography
-
C. H. Bennett, T. Mor, and J. A. Smolin, Parity bit in quantum cryptography, Phys. Rev. A, 54 (1996), 2675-2684.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 2675-2684
-
-
Bennett, C.H.1
Mor, T.2
Smolin, J.A.3
-
10
-
-
0001452279
-
Security of quantum cryptography against collective attacks
-
E. Biham and T. Mor, Security of quantum cryptography against collective attacks, Phys. Rev. Lett., 78 (1997), 2256-2259.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 2256-2259
-
-
Biham, E.1
Mor, T.2
-
11
-
-
0031273993
-
Bounds on information and the security of quantum cryptography
-
E. Biham and T. Mor, Bounds on information and the security of quantum cryptography, Phys. Rev. Lett., 79 (1997), 4034-4037.
-
(1997)
Phys. Rev. Lett.
, vol.79
, pp. 4034-4037
-
-
Biham, E.1
Mor, T.2
-
12
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science, 283 (1999), 2050-2056.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
13
-
-
0003976873
-
-
Quant-ph/9802025 (a very preliminary version of Mayers' proof appeared in [14])
-
D. Mayers, Unconditional security in quantum cryptography. Quant-ph/9802025 (a very preliminary version of Mayers' proof appeared in [14]), 1998.
-
(1998)
Unconditional Security in Quantum Cryptography
-
-
Mayers, D.1
-
14
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
also Quant-ph/0003004
-
P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., 85 (2000), 441-444 (also Quant-ph/0003004).
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
15
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channel
-
LNCS 1109, Springer-Verlag, Berlin
-
D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, in Advances in Cryptology - CRYPTO '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 343-357.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 343-357
-
-
Mayers, D.1
-
19
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding, Probability inequalities for sums of bounded random variables, J. Amer. Statist. Assoc., 58 (1963), 13-20.
-
(1963)
J. Amer. Statist. Assoc.
, vol.58
, pp. 13-20
-
-
Hoeffding, W.1
-
20
-
-
0032667067
-
Cryptographic distinguishability measures for quantum-mechanical states
-
C. A. Fuchs and J. van de Graaf, Cryptographic distinguishability measures for quantum-mechanical states, IEEE Trans. Inform. Theory, 45 (1999), 1216-1227.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 1216-1227
-
-
Fuchs, C.A.1
Van De Graaf, J.2
|