메뉴 건너뛰기




Volumn 50, Issue 2, 2004, Pages 394-400

Reconciliation of a Quantum-Distributed Gaussian Key

Author keywords

Cryptography; Privacy amplification; Quantum secret key distribution; Secret key agreement

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); DATA PRIVACY; GAUSSIAN NOISE (ELECTRONIC); MAXIMUM LIKELIHOOD ESTIMATION; PROBABILITY; RANDOM PROCESSES; SIGNAL TO NOISE RATIO;

EID: 1442337635     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2003.822618     Document Type: Article
Times cited : (195)

References (29)
  • 2
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett., vol. 68, p. 3121, 1992.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121
    • Bennett, C.H.1
  • 5
    • 0035332232 scopus 로고    scopus 로고
    • Quantum distribution of Gaussian keys using squeezed states
    • May
    • N. J. Cerf, M. Lévy, and G. Van Assche, "Quantum distribution of Gaussian keys using squeezed states," Phys. Rev. A, vol. 63, p. 052311, May 2001.
    • (2001) Phys. Rev. A , vol.63 , pp. 052311
    • Cerf, N.J.1    Lévy, M.2    Van Assche, G.3
  • 6
    • 0037017198 scopus 로고    scopus 로고
    • Continuous variable quantum cryptography using coherent states
    • Feb.
    • F. Grosshans and P. Grangier, "Continuous variable quantum cryptography using coherent states," Phys. Rev. Lett., vol. 88, p. 057902, Feb. 2002.
    • (2002) Phys. Rev. Lett. , vol.88 , pp. 057902
    • Grosshans, F.1    Grangier, P.2
  • 7
  • 8
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 10
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 13
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Syst. Sci., vol. 18, pp. 143-154, 1979.
    • (1979) J. Comp. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 15
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • B. Preneel, Ed. Berlin, Germany: Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - Eurocrypt 2000 (Lecture Notes in Computer Science), B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 351-368.
    • (2000) Advances in Cryptology - Eurocrypt 2000 (Lecture Notes in Computer Science) , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 18
    • 1442358427 scopus 로고
    • Analogue of the Vernam system for continuous time series
    • MM 43-110-44, May
    • C. E. Shannon, "Analogue of the Vernam system for continuous time series," Bell Labs. Memo, MM 43-110-44, May 1943.
    • (1943) Bell Labs. Memo
    • Shannon, C.E.1
  • 20
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • July
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. IT-19, pp. 471-480, July 1973.
    • (1973) IEEE Trans. Inform. Theory , vol.IT-19 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 21
    • 0032651629 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • Mar.
    • S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," in Proc. IEEE Data Compression Conf., Mar. 1999, pp. 158-167.
    • (1999) Proc. IEEE Data Compression Conf. , pp. 158-167
    • Pradhan, S.S.1    Ramchandran, K.2
  • 23
    • 0034296204 scopus 로고    scopus 로고
    • A study on secret key reconciliation protocol Cascade
    • Oct.
    • T. Sugimoto and K. Yamazaki, "A study on secret key reconciliation protocol Cascade," IEICE Trans. Fundamentals, vol. E83-A, no. 10, pp. 1987-1991, Oct. 2000.
    • (2000) IEICE Trans. Fundamentals , vol.E83-A , Issue.10 , pp. 1987-1991
    • Sugimoto, T.1    Yamazaki, K.2
  • 26
    • 4243703966 scopus 로고    scopus 로고
    • Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations
    • M. D. Reid, "Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations," Phys. Rev. A, vol. 62, p. 062308, 2000.
    • (2000) Phys. Rev. A , vol.62 , pp. 062308
    • Reid, M.D.1
  • 27
    • 0346688181 scopus 로고    scopus 로고
    • Continuous variable quantum cryptography
    • T. C. Ralph, "Continuous variable quantum cryptography," Phys. Rev. A, vol. 61, p. 010303(R), 2000.
    • (2000) Phys. Rev. A , vol.61
    • Ralph, T.C.1
  • 28
    • 4243332662 scopus 로고    scopus 로고
    • Quantum cryptography with squeezed states
    • M. Hillery, "Quantum cryptography with squeezed states," Phys. Rev. A, vol. 61, p. 022309, 2000.
    • (2000) Phys. Rev. A , vol.61 , pp. 022309
    • Hillery, M.1
  • 29
    • 0037156920 scopus 로고    scopus 로고
    • Quantum key distribution with bright entangled beams
    • C. Silberhorn, N. Korolkova, and G. Leuchs, "Quantum key distribution with bright entangled beams," Phys. Rev. Lett., vol. 88, p. 167902, 2002.
    • (2002) Phys. Rev. Lett. , vol.88 , pp. 167902
    • Silberhorn, C.1    Korolkova, N.2    Leuchs, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.