-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE
-
C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, 1984, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0343152990
-
Quantum cryptography based on Bell theorem
-
A. K. Ekert, Quantum Cryptography Based on Bell Theorem, Phys. Rev. Lett. 67, 661 (1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
3
-
-
3042730516
-
-
D. Mayers, Journal of ACM, 48, 351 (2001). Available on-line at http://arxiv.org/abs/quant-ph/9802025.
-
(2001)
Journal of ACM
, vol.48
, pp. 351
-
-
Mayers, D.1
-
4
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channel
-
Lecture Notes in Computer Science, Springer-Verlag
-
A preliminary version in D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, Advances in Cryptology -Proceedings of Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, 1996, pp. 343-357;
-
(1996)
Advances in Cryptology -Proceedings of Crypto' 96
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
5
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, 2050 (1999);
-
(1999)
Science
, vol.283
, pp. 2050
-
-
Lo, H.-K.1
Chau, H.F.2
-
6
-
-
23744476988
-
-
also available at http://xxx.lanl.gov/abs/quant-ph/9803006 ;
-
-
-
-
7
-
-
0033702887
-
A proof of security of quantum key distribution
-
ACM Press, New York
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, A proof of security of quantum key distribution, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, ACM Press, New York, 2000, p. 715
-
(2000)
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing
, pp. 715
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
9
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution scheme
-
P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution scheme, Phys. Rev. Lett. 85, 441 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
11
-
-
6144265213
-
-
Erratum: Phys. Rev. Lett. 80, 2022 (1998)
-
D. Deutsch et al., Phys. Rev. Lett. 77, 2818 (1996); Erratum: Phys. Rev. Lett. 80, 2022 (1998).
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818
-
-
Deutsch, D.1
-
12
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Security of quantum key distribution with imperfect devices, Quantum Information and Computation 4, 325 (2004);
-
(2004)
Quantum Information and Computation
, vol.4
, pp. 325
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
13
-
-
23744496549
-
-
available at http://arxiv.org/abs/quant-ph/0212066
-
-
-
-
15
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.-Y. Hwang, Quantum Key Distribution with High Loss: Toward Global Secure Communication, Phys. Rev. Lett. 91, 057901 (2003).
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
16
-
-
23744506113
-
Decoy state quantum key distribution
-
Preliminary results were presented in, July and various scientific conferences such as Fields Institute Conference on Quantum Information and Quantum Control, http://www.fields.utoronto.ca/programs/scientific/04-05/ quantumIC/abstracts/lo.ppt
-
H.-K. Lo, X. Ma and K. Chen Decoy State Quantum Key Distribution, http://arxiv.org/abs/quant-ph/0411004. Preliminary results were presented in Proceedings of IEEE ISIT 2004, July 2004 and various scientific conferences such as Fields Institute Conference on Quantum Information and Quantum Control, http://www.fields.utoronto.ca/programs/scientific/04-05/quantumIC/abstracts/lo. ppt
-
(2004)
Proceedings of IEEE ISIT 2004
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
17
-
-
17444398022
-
Efficient quantum key distribution scheme and proof of its security
-
ISSN: 0933-2790 (Paper) (Online), published online 3 March, (10.1007/s00145-004-0142-y). (Springer-Verlag New York, LLC)
-
H.-K. Lo, H. F. Chau, and M. Ardehali, Efficient Quantum Key Distribution Scheme and Proof of its Security, J. of Cryptology, ISSN: 0933-2790 (Paper) 1432-1378 (Online), published online 3 March 2004, (10.1007/s00145-004-0142-y). (Springer-Verlag New York, LLC). http://arxiv.org/abs/quant-ph/0011056.
-
(2004)
J. of Cryptology
, pp. 1432-11378
-
-
Lo, H.-K.1
Chau, H.F.2
Ardehali, M.3
-
22
-
-
23744449651
-
-
Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, Experimental Decoy State Quantum Key Distribution Over 15km, http://arxiv.org/abs/quant-ph/0503192
-
Experimental Decoy State Quantum Key Distribution over 15km
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
25
-
-
0037319628
-
Security of quantum key distribution with two-way classical communications
-
D. Gottesman and H.-K. Lo, Security of quantum key distribution with two-way classical communications, IEEE Transactions on Information Theory 49, No. 2, p. 457 (2003). http://arxiv.org/abs/quant-ph/0105121
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 457
-
-
Gottesman, D.1
Lo, H.-K.2
|