메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 386-406

The universal composable security of quantum key distribution

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 24144445587     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_21     Document Type: Conference Paper
Times cited : (222)

References (40)
  • 2
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. Ekert. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett., 67(6):661-663, 1991.
    • (1991) Phys. Rev. Lett. , vol.67 , Issue.6 , pp. 661-663
    • Ekert, A.1
  • 3
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. Bennett. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett., 68(21):3121-3124, 1992.
    • (1992) Phys. Rev. Lett. , vol.68 , Issue.21 , pp. 3121-3124
    • Bennett, C.1
  • 5
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • New York. Springer-Verlag
    • D. Mayers. Quantum key distribution and string oblivious transfer in noisy channels. In Advances in Cryptography-Proceedings of Crypto'96, pages 343-357, New York, 1996. Springer-Verlag.
    • (1996) Advances in Cryptography-proceedings of Crypto'96 , pp. 343-357
    • Mayers, D.1
  • 6
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • quant-ph/9802025
    • D. Mayers. Unconditional security in quantum cryptography. J. Assoc. Comp. Mach, 48:351, 2001. quant-ph/9802025.
    • (2001) J. Assoc. Comp. Mach , vol.48 , pp. 351
    • Mayers, D.1
  • 7
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • quant-ph/9803006
    • H.-K. Lo and H. F. Chau. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 283:2050-2056, 1999. quant-ph/9803006.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 9
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the bb84 quantum key distribution protocol
    • quant-ph/0003004
    • P. Shor and J. Preskill. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett., 85:441-444, 2000. quant-ph/0003004.
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441-444
    • Shor, P.1    Preskill, J.2
  • 10
    • 0037526588 scopus 로고    scopus 로고
    • Unconditionally secure key distribution based on two nonorthogonal states
    • quant-ph/0212162
    • K. Tamaki, M. Koashi, and N. Imoto. Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett., 90:167904, 2003. quant-ph/0212162.
    • (2003) Phys. Rev. Lett. , vol.90 , pp. 167904
    • Tamaki, K.1    Koashi, M.2    Imoto, N.3
  • 11
    • 0037319628 scopus 로고    scopus 로고
    • Proof of security of quantum key distribution with two-way classical communications
    • quant-ph/0105121
    • G. Gottesman and H.-K. Lo. Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory, 49(2):457-475, 2003. quant-ph/0105121.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.2 , pp. 457-475
    • Gottesman, G.1    Lo, H.-K.2
  • 12
    • 33645595982 scopus 로고    scopus 로고
    • C. Bennett and J. Smolin first suggested the key degradation problem to one of us, and A. Harrow has obtained partial results
    • C. Bennett and J. Smolin first suggested the key degradation problem to one of us, and A. Harrow has obtained partial results.
  • 15
    • 0000498732 scopus 로고
    • Optimal detection of quantum information
    • A. Peres and W. Wootters. Optimal detection of quantum information. Phys. Rev. Lett., 66:1119-1122, 1991.
    • (1991) Phys. Rev. Lett. , vol.66 , pp. 1119-1122
    • Peres, A.1    Wootters, W.2
  • 22
    • 33645590612 scopus 로고    scopus 로고
    • Relating formal security for classical and quantum protocols
    • Isaac Newton Institute for Mathematical Sciecnes, September
    • D. Unruh. Relating formal security for classical and quantum protocols. Presentation at the Special week on Quantum crytography, Isaac Newton Institute for Mathematical Sciecnes, September 2004. Available at http://www.unruh.de/DniQ/publications.
    • (2004) Special Week on Quantum Crytography
    • Unruh, D.1
  • 29
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2
  • 30
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett., 81:3018-3021, 1998.
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018-3021
    • Bruss, D.1
  • 32
    • 6144265213 scopus 로고    scopus 로고
    • Quantum privacy amplification and the security of quantum cryptography over noisy channels
    • quant-ph/9604039
    • D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett., 77:2818, 1996. quant-ph/9604039.
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 2818
    • Deutsch, D.1    Ekert, A.2    Jozsa, R.3    Macchiavello, C.4    Popescu, S.5    Sanpera, A.6
  • 36
    • 33645598913 scopus 로고    scopus 로고
    • note
    • An acyclic circuit is a partially ordered set of gates. However, associating the circuit with constraints on the timing of the adversarial attack is a delicate issue. Suppose the circuit contains conditional gates controlled by random public classical registers. The gates on the target may or may not be applied depending on the values of the control registers. When the gates are not applied, the associated time-constraints of the adversarial attack disappear. In the extension to the usual acyclic circuit model, we consider all possible values of the control registers and the resulting sets of nontrivial partially ordered operations, and the corresponding constraints on the adversarial attack.
  • 39
    • 0002455537 scopus 로고
    • Information-theoretical aspects of quantum measurement
    • A. Holevo. Information-theoretical aspects of quantum measurement. Problemy Peredachi Informatsii, 9(2):31-42, 1973.
    • (1973) Problemy Peredachi Informatsii , vol.9 , Issue.2 , pp. 31-42
    • Holevo, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.