메뉴 건너뛰기




Volumn 5815, Issue , 2005, Pages 13-26

Polarization-entangled light for quantum key distribution: How frequency spectrum and energy affect detection statistics

Author keywords

Frequency spectrum; Polarization entanglement; Quantum cryptography

Indexed keywords

LIGHT POLARIZATION; NATURAL FREQUENCIES; OPTICAL SYSTEMS; SIGNAL PROCESSING;

EID: 27644483838     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.603473     Document Type: Conference Paper
Times cited : (5)

References (13)
  • 1
    • 0036612254 scopus 로고    scopus 로고
    • Gaps between equations and experiments in quantum cryptography
    • J. M. Myers and F. H. Madjid, "Gaps between equations and experiments in quantum cryptography," J. Opt. B: Quantum Semiclass. Opt. 4, pp. S109-S116, 2002.
    • (2002) J. Opt. B: Quantum Semiclass. Opt. , vol.4
    • Myers, J.M.1    Madjid, F.H.2
  • 2
    • 27644596637 scopus 로고    scopus 로고
    • Matched detectors as definers offeree
    • arXiv:quant-ph/0404113 v2 ; accepted for publication
    • F. H. Madjid and J. M. Myers, "Matched detectors as definers offeree," arXiv:quant-ph/0404113 v2, 2004; accepted for publication in Annals of Physics.
    • (2004) Annals of Physics
    • Madjid, F.H.1    Myers, J.M.2
  • 3
    • 10444255789 scopus 로고    scopus 로고
    • A proof that measured data and equations of quantum mechanics can be linked only by guesswork
    • Quantum Computation and Information, S. J. Lomonaco, Jr. and H. E. Brandt, eds., American Mathematical Society, Providence, RI
    • J. M. Myers and F. H. Madjid, "A proof that measured data and equations of quantum mechanics can be linked only by guesswork," Quantum Computation and Information, S. J. Lomonaco, Jr. and H. E. Brandt, eds., Contemporary Mathematics Series, Vol. 305, pp. 221-244, American Mathematical Society, Providence, RI, 2002.
    • (2002) Contemporary Mathematics Series , vol.305 , pp. 221-244
    • Myers, J.M.1    Madjid, F.H.2
  • 4
    • 27644580168 scopus 로고    scopus 로고
    • note
    • I am indebted to Chip Elliott of BBN Technologies for the distinction between attacks to which published proofs apply, which he has called "signature attacks," and a more vicious attack that modifies Bob's receiver, which he has called a "boundary attack."
  • 9
    • 0000005686 scopus 로고    scopus 로고
    • Security of quantum cryptography against individual attacks
    • B. A. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, "Security of quantum cryptography against individual attacks," Phys. Rev. A 57, pp. 2383-2398, 1998.
    • (1998) Phys. Rev. A , vol.57 , pp. 2383-2398
    • Slutsky, B.A.1    Rao, R.2    Sun, P.-C.3    Fainman, Y.4
  • 10
  • 11
    • 0003083815 scopus 로고
    • Linkages between the calculable and the incalculable in quantum theory
    • F. H. Madjid and J. M. Myers, "Linkages between the calculable and the incalculable in quantum theory," Annals of Physics 221, pp. 258-305, 1993.
    • (1993) Annals of Physics , vol.221 , pp. 258-305
    • Madjid, F.H.1    Myers, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.