-
1
-
-
0036756894
-
Security proof of quantum cryptography based entirely on entanglement purification
-
H. Aschauer and H. J. Briegel, Security proof of quantum cryptography based entirely on entanglement purification, Phys. Rev. A, vol. 66 (2002) 032302.
-
(2002)
Phys. Rev. A
, vol.66
, pp. 032302
-
-
Aschauer, H.1
Briegel, H.J.2
-
2
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett., vol. 68 (1992), pp. 3121-3124.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin. Experimental quantum cryptography, J. Cryptology, vol. 5 (1992), pp. 3-28.
-
(1992)
J. Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE, New York
-
C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, New York, 1984, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
84969361843
-
Practical quantum oblivious transfer
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
C. H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska, Practical quantum oblivious transfer, Advances in Cryptology: Proceedings of Crypto '91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1992, pp. 351-366.
-
(1992)
Advances in Cryptology: Proceedings of Crypto '91
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
6
-
-
0002977948
-
Quantum cryptography
-
Oct.
-
C. H. Bennett, G. Brassard, and A. K. Ekert, Quantum cryptography, Scientific American, vol. 267, no. 4 (Oct. 1992), pp. 50-57.
-
(1992)
Scientific American
, vol.267
, Issue.4
, pp. 50-57
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.K.3
-
7
-
-
11944263767
-
Quantum cryptography without Bell's theorem
-
C. H. Bennett, G. Brassard, and N. D. Mermin, Quantum cryptography without Bell's theorem, Phys. Rev. Lett., vol. 68 ( 1992). pp. 557-559.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 557-559
-
-
Bennett, C.H.1
Brassard, G.2
Mermin, N.D.3
-
8
-
-
4243216277
-
Mixed state entanglement and quantum error correction
-
C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, Mixed state entanglement and quantum error correction, Phys. Rev. A, vol. 54 (1996), pp. 3824-3851.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 3824-3851
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
10
-
-
0033702887
-
A proof of security of quantum key distribution
-
ACM Press, New York
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, A proof of security of quantum key distribution, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, ACM Press, New York, 2000, pp. 715-724.
-
(2000)
Proceedings of the Thirty-second Annual ACM Symposium on Theory of Computing
, pp. 715-724
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
11
-
-
84928045174
-
Quantum cryptographic network based on quantum memories
-
E. Biham, B. Huttner, and T. Mor, Quantum cryptographic network based on quantum memories, Phys. Rev. A, vol. 54 (1996), pp. 2651-2658.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 2651-2658
-
-
Biham, E.1
Huttner, B.2
Mor, T.3
-
12
-
-
0027803208
-
A quantum bit commitment scheme provably unbreakable by both parties
-
G. Brassard, C. Crépeau, R. Jozsa, and D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, Proceedings of the 34th annual IEEE Symposium on the Foundation of Computer Science, 1993, pp. 362-371.
-
(1993)
Proceedings of the 34th Annual IEEE Symposium on the Foundation of Computer Science
, pp. 362-371
-
-
Brassard, G.1
Crépeau, C.2
Jozsa, R.3
Langlois, D.4
-
13
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., vol. 81 (1998), pp. 3018-3021.
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3018-3021
-
-
Bruss, D.1
-
14
-
-
0033723833
-
Daylight quantum key distribution over 1.6 km
-
W. T. Buttler, R. J. Hughes, S. K. Lamoreaux, G. L. Morgan, J. E. Nordholt, and C. G. Peterson, Daylight quantum key distribution over 1.6 km, Phy. Rev. Lett., vol. 84 (2000), pp. 5652-5655.
-
(2000)
Phy. Rev. Lett.
, vol.84
, pp. 5652-5655
-
-
Buttler, W.T.1
Hughes, R.J.2
Lamoreaux, S.K.3
Morgan, G.L.4
Nordholt, J.E.5
Peterson, C.G.6
-
15
-
-
0001398327
-
Good quantum error correcting codes exist
-
A. R. Calderbank and P. Shor, Good quantum error correcting codes exist, Phys. Rev. A, vol. 54 ( 1996), 1098-1105.
-
Phys. Rev. A
, vol.54
, Issue.1996
, pp. 1098-1105
-
-
Calderbank, A.R.1
Shor, P.2
-
17
-
-
0032325993
-
Making an empty promise with a quantum computer
-
H. F. Chau and H.-K. Lo, Making an empty promise with a quantum computer. Fortschr. Phys., vol. 56 (1998), pp. 507-519.
-
(1998)
Fortschr. Phys.
, vol.56
, pp. 507-519
-
-
Chau, H.F.1
Lo, H.-K.2
-
18
-
-
6144265213
-
-
errata, vol. 80 (1998), p. 2022
-
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, Phys. Rev. Lett., vol. 77 (1996), p. 2818, errata, vol. 80 (1998), p. 2022.
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
19
-
-
33750978344
-
Communication by EPR devices
-
D. Dieks, Communication by EPR devices, Phys. Lett. A, vol. 92 (1982), pp. 271-273.
-
(1982)
Phys. Lett. A
, vol.92
, pp. 271-273
-
-
Dieks, D.1
-
20
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, vol. IT-22, no. 6 (1976), pp. 644-654.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
21
-
-
0343152990
-
Qauntum cryptography based on Bell's theorem
-
A. K. Ekert, Qauntum cryptography based on Bell's theorem, Phys. Rev. Lett., vol. 67 (1991), pp. 661-663.
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
22
-
-
0000004338
-
Quantum cryptography based on orthogonal states
-
L. Goldenberg and L. Vaidman, Quantum cryptography based on orthogonal states, Phys. Rev. Lett., vol. 75 (1995), pp. 1239-1243.
-
(1995)
Phys. Rev. Lett.
, vol.75
, pp. 1239-1243
-
-
Goldenberg, L.1
Vaidman, L.2
-
23
-
-
0000132422
-
A class of quantum error-correcting codes saturating the quantum Hamming bound
-
D. Gottesman, A class of quantum error-correcting codes saturating the quantum Hamming bound, Phys. Rev. A, vol. 54 (1996), pp. 1862-1868.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 1862-1868
-
-
Gottesman, D.1
-
25
-
-
0001872185
-
From quantum cheating to quantum security
-
D. Gottesman and H.-K. Lo, From quantum cheating to quantum security, Phys. Today, vol. 53. no. 11 (2000), pp. 22-27, also available at http://www.physicstoday.org/pt/vol-53/iss-11/p22.html.
-
(2000)
Phys. Today
, vol.53
, Issue.11
, pp. 22-27
-
-
Gottesman, D.1
Lo, H.-K.2
-
26
-
-
0037319628
-
Proof of security of quantum key distribution with two-way classical communications
-
D. Gottesman and H.-K. Lo, Proof of security of quantum key distribution with two-way classical communications, IEEE Trans. Inform. Theory, vol. 49, no. 2 (2003), pp. 457-475; also available at http://xxx.lanl.gov/abs/quant-ph/ 0105121.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.2
, pp. 457-475
-
-
Gottesman, D.1
Lo, H.-K.2
-
28
-
-
0141771056
-
Secure quantum key distribution using squeezed states
-
D. Gottesman and J. Preskill, Secure quantum key distribution using squeezed states, Phys. Rev. A, vol. 63 (2001) 022309; also available at http://xxx.lanl.gov/abs/quant-ph/0008046.
-
(2001)
Phys. Rev. A
, vol.63
, pp. 022309
-
-
Gottesman, D.1
Preskill, J.2
-
29
-
-
0038587554
-
Capacity of a quantum communications channel
-
A. S. Holevo, Capacity of a quantum communications channel, Problems Inform. Transmission, vol. 9 (1973), p. 117.
-
(1973)
Problems Inform. Transmission
, vol.9
, pp. 117
-
-
Holevo, A.S.1
-
30
-
-
0034652057
-
Quantum key distribution over a 48 km optical fibre network
-
R. J. Hughes, G. L. Morgan, and C. G. Peterson, Quantum key distribution over a 48 km optical fibre network, J. Mod. Opt., vol. 47 (2000), pp. 533-548.
-
(2000)
J. Mod. Opt.
, vol.47
, pp. 533-548
-
-
Hughes, R.J.1
Morgan, G.L.2
Peterson, C.G.3
-
34
-
-
0013056114
-
Quantum cryptography in free space
-
B. C. Jacobs and J. D. Franson, Quantum cryptography in free space, Opt. Lett., vol. 21 (1996), pp. 1854-1856.
-
(1996)
Opt. Lett.
, vol.21
, pp. 1854-1856
-
-
Jacobs, B.C.1
Franson, J.D.2
-
35
-
-
0005219364
-
Some applications and extensions of the de Finetti representation theorem
-
P. K. Goel and A. Zellner, eds., North-Holland, Amsterdam
-
E. T. Jaynes, Some applications and extensions of the de Finetti representation theorem, in Bayesian Inference and Decision Techniques with Applications: Essays in Honor of Bruno de Finetti, P. K. Goel and A. Zellner, eds., North-Holland, Amsterdam, p. 31.
-
Bayesian Inference and Decision Techniques with Applications: Essays in Honor of Bruno de Finetti
, pp. 31
-
-
Jaynes, E.T.1
-
36
-
-
0001532069
-
Quantum cryptography based on split transmission of one-bit
-
M. Koashi and N. Imoto, Quantum cryptography based on split transmission of one-bit, Phys. Rev. Lett., vol. 79 (1997), pp. 2383-2386.
-
(1997)
Phys. Rev. Lett.
, vol.79
, pp. 2383-2386
-
-
Koashi, M.1
Imoto, N.2
-
37
-
-
17444415101
-
-
Private communications
-
S. M. S. Lee, Private communications.
-
-
-
Lee, S.M.S.1
-
38
-
-
0001236013
-
Insecurity of quantum secure computaions
-
H.-K. Lo, Insecurity of quantum secure computaions, Phys. Rev. A, vol. 56 (1997). pp. 1154-1162.
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1154-1162
-
-
Lo, H.-K.1
-
39
-
-
0035823463
-
A simple proof of the unconditional security of quantum key distribution
-
H.-K. Lo, A simple proof of the unconditional security of quantum key distribution, J. Phys. A, vol. 34 (2001), 6957; also available at http://xxx.lanl.gov/abs/quant-ph/9904091.
-
(2001)
J. Phys. A
, vol.34
, pp. 6957
-
-
Lo, H.-K.1
-
40
-
-
0013207242
-
Proof of unconditional security of six-state quantum key distribution scheme
-
H.-K. Lo, Proof of unconditional security of six-state quantum key distribution scheme, QIC, vol. 1, no. 2 (2001), pp. 81-94.
-
(2001)
QIC
, vol.1
, Issue.2
, pp. 81-94
-
-
Lo, H.-K.1
-
41
-
-
0001260566
-
Is quantum bit commitment really possible?
-
H.-K. Lo and H. F. Chau, Is quantum bit commitment really possible?, Phys. Rev. Lett., vol. 78 (1997), pp. 3410-3413; also available at http://xxx.lanl.gov/abs/quant-ph/9603004.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3410-3413
-
-
Lo, H.-K.1
Chau, H.F.2
-
42
-
-
0001731260
-
Why quantum bit commitment and ideal quantum coin tossing are impossible
-
H.-K. Lo and H. F. Chau, Why quantum bit commitment and ideal quantum coin tossing are impossible, Phys. D, vol. 120 (1998), pp. 177-187; also available at http://xxx.lanl.gov/abs/quant-ph/9605026.
-
(1998)
Phys. D
, vol.120
, pp. 177-187
-
-
Lo, H.-K.1
Chau, H.F.2
-
43
-
-
17444412036
-
-
Quantum Cryptographic System with Reduced Data Loss, U.S. Patent Number 5,732,139 (March 24)
-
H.-K. Lo and H. F. Chau, Quantum Cryptographic System with Reduced Data Loss, U.S. Patent Number 5,732,139 (March 24, 1998).
-
(1998)
-
-
Lo, H.-K.1
Chau, H.F.2
-
44
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science, vol. 283 (1999), pp. 2050-2056; also available at http://xxx.lanl.gov/abs/quantph/9803006.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
46
-
-
0003482738
-
-
World Scientific, Singapore
-
H.-K. Lo, S. Popescu, and T. Spiller, eds., Introduction to Quantum Computation and Information, World Scientific, Singapore, 1998.
-
(1998)
Introduction to Quantum Computation and Information
-
-
Lo, H.-K.1
Popescu, S.2
Spiller, T.3
-
47
-
-
0033099611
-
Good error-correcting codes based on very sparse matrices
-
D. J. C. MacKay, Good error-correcting codes based on very sparse matrices, IEEE Trans. Inform. Theory, vol. 45, no. 2 (1999), pp. 399-431.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.2
, pp. 399-431
-
-
MacKay, D.J.C.1
-
48
-
-
0001336918
-
Uncoditionally secure quantum bit commitment is impossible
-
D. Mayers, Uncoditionally secure quantum bit commitment is impossible, Phys. Rev. Lett., vol. 78 (1997), pp. 3414-3417.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
49
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Mach., vol. 48, no. 3 (2001), pp. 351-406. A preliminary version in D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, Advances in Cryptology - Proceedings of Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, Berlin, 1996, pp. 343-357.
-
(2001)
J. Assoc. Comput. Mach.
, vol.48
, Issue.3
, pp. 351-406
-
-
Mayers, D.1
-
50
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channel
-
A preliminary version Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Mach., vol. 48, no. 3 (2001), pp. 351-406. A preliminary version in D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, Advances in Cryptology - Proceedings of Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, Berlin, 1996, pp. 343-357.
-
(1996)
Advances in Cryptology - Proceedings of Crypto' 96
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
51
-
-
33750021221
-
Underwater quantum coding
-
A. Muller, H. Zbinden, and N. Gisin, Underwater quantum coding, Nature, vol. 378 (1995). pp. 449-449.
-
(1995)
Nature
, vol.378
, pp. 449-449
-
-
Muller, A.1
Zbinden, H.2
Gisin, N.3
-
52
-
-
17444418785
-
-
Private communications
-
J. Renes, Private communications.
-
-
-
Renes, J.1
-
53
-
-
0004221065
-
-
Spinger-Verlag, Berlin, equation (1.2.5)
-
S. Roman, Coding and Information Theory, Spinger-Verlag, Berlin, 1992, equation (1.2.5) on p. 26.
-
(1992)
Coding and Information Theory
, pp. 26
-
-
Roman, S.1
-
54
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE Press, Piscataway, NJ
-
P. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Press, Piscataway, NJ, 1994, pp. 124-134.
-
(1994)
Proceedings 35th Annual Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.1
-
55
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., vol. 26 (1997), pp. 1484-1509.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.1
-
56
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution scheme
-
P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution scheme, Phys. Rev. Lett., vol. 85 (2000), pp. 441-444.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
57
-
-
17444386471
-
On approximation of hypergeometric distribution
-
R. Sródka, On approximation of hypergeometric distribution, Nauk. Politech. Lódikiej, vol. 10 (1963), pp. 5-17 as cited in Univariate Discrete Distributions, 2nd edn., N. L. Johnson, S. Kotz, and A. W. Kemp, eds., Wiley, New York, 1992, equation (6.70) on p. 256.
-
(1963)
Nauk. Politech. Lódikiej
, vol.10
, pp. 5-17
-
-
Sródka, R.1
-
58
-
-
0003763748
-
-
Wiley, New York, equation (6.70)
-
R. Sródka, On approximation of hypergeometric distribution, Nauk. Politech. Lódikiej, vol. 10 (1963), pp. 5-17 as cited in Univariate Discrete Distributions, 2nd edn., N. L. Johnson, S. Kotz, and A. W. Kemp, eds., Wiley, New York, 1992, equation (6.70) on p. 256.
-
(1992)
Univariate Discrete Distributions, 2nd Edn.
, pp. 256
-
-
Johnson, N.L.1
Kotz, S.2
Kemp, A.W.3
-
59
-
-
0007244732
-
Multiple particle interference and error correction
-
A. M. Steane, Multiple particle interference and error correction, Proc. Roy. Sac. London Ser.A, vol. 452 (1996), pp. 2551-2577.
-
(1996)
Proc. Roy. Sac. London Ser.A
, vol.452
, pp. 2551-2577
-
-
Steane, A.M.1
-
61
-
-
0039498880
-
Quantum cryptography on optical fiber networks
-
P. Townsend, Quantum cryptography on optical fiber networks, Opt. Fiber Technol., vol. 4 (1998). pp. 345-370.
-
(1998)
Opt. Fiber Technol.
, vol.4
, pp. 345-370
-
-
Townsend, P.1
-
62
-
-
0001998264
-
Conjugate coding
-
manuscript written in about 1970
-
S. Wiesner, Conjugate coding, Sigact News, vol. 15. no. 1 (1983). pp. 78-88, manuscript written in about 1970.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
63
-
-
33746708860
-
A single quantum cannot be cloned
-
W. K. Wootters and W. Zurek. A single quantum cannot be cloned, Nature, vol. 299 (1982). pp. 802-803.
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.2
|