메뉴 건너뛰기




Volumn 10, Issue 4, 2000, Pages 383-399

Quantum key distribution: From principles to practicalities

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 3042553178     PISSN: 09381279     EISSN: None     Source Type: Journal    
DOI: 10.1007/s002000050137     Document Type: Article
Times cited : (35)

References (37)
  • 1
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
    • Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography. Phys. Rev. A 59, 4238-1248 (1999)
    • (1999) Phys. Rev. A , vol.59 , pp. 4238-11248
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 2
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • Bennett, C: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121-3124 (1992)
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.1
  • 8
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • Norway, 1993, Berlin: Springer
    • Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Proceedings of Eurocrypt '93, held in Lofthus, Norway, 1993, pp 410-423. Berlin: Springer 1994
    • (1994) Proceedings of Eurocrypt '93, Held in Lofthus , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 9
    • 2442492740 scopus 로고    scopus 로고
    • Quantum repeaters: The role of imperfect local operations in quantum communication
    • Briegel, H. J., Dür, W., Cirac, J. I., Zoller, P.: Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication. Phys. Rev. Lett. 81, 5932-5935 (1998)
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 5932-5935
    • Briegel, H.J.1    Dür, W.2    Cirac, J.I.3    Zoller, P.4
  • 10
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018-3021 (1998)
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018-3021
    • Bruß, D.1
  • 12
    • 0041633351 scopus 로고    scopus 로고
    • Coherent eavesdropping strategies for the 4-state quantum cryptography protocol
    • Cirac, I., Gisin, N.: Coherent eavesdropping strategies for the 4-state quantum cryptography protocol. Phys. Lett. A 229, 1-7 (1997)
    • (1997) Phys. Lett. A , vol.229 , pp. 1-7
    • Cirac, I.1    Gisin, N.2
  • 13
    • 6144265213 scopus 로고    scopus 로고
    • Quantum privacy amplification and the security of quantum cryptography over noisy channels
    • Deutsch, D., Ekert, A., Josza, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77, 2818-2821 (1996)
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 2818-2821
    • Deutsch, D.1    Ekert, A.2    Josza, R.3    Macchiavello, C.4    Popescu, S.5    Sanpera, A.6
  • 14
    • 0017018484 scopus 로고
    • Diffie, W., Hellman, M.: IEEE Trans. Inf. Theory IT-22, 644 (1977); Rivest, R., Shamir, A., Adleman, L.: "On Digital Signatures and Public-Key Cryptosystems", MIT Lab. for Comp. Science, Technical report, MIT/LCS/TR-212 (Jan. 1979)
    • (1977) IEEE Trans. Inf. Theory , vol.IT-22 , pp. 644
    • Diffie, W.1    Hellman, M.2
  • 15
    • 0004196798 scopus 로고
    • On digital signatures and public-key cryptosystems
    • Technical report, MIT/LCS/TR-212 (Jan.)
    • Diffie, W., Hellman, M.: IEEE Trans. Inf. Theory IT-22, 644 (1977); Rivest, R., Shamir, A., Adleman, L.: "On Digital Signatures and Public-Key Cryptosystems", MIT Lab. for Comp. Science, Technical report, MIT/LCS/TR-212 (Jan. 1979)
    • (1979) MIT Lab. for Comp. Science
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • Ekert, A.: Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661-663 (1991)
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.1
  • 17
    • 0000515658 scopus 로고
    • Eavesdropping on quantum-crypto-graphical systems
    • Ekert, A. K., Huttner, B., Palma, G. M. N., Peres, A.: Eavesdropping on quantum-crypto-graphical systems. Phys. Rev. A 50, 1047-1056 (1994)
    • (1994) Phys. Rev. A , vol.50 , pp. 1047-1056
    • Ekert, A.K.1    Huttner, B.2    Palma, G.M.N.3    Peres, A.4
  • 19
    • 0001328001 scopus 로고    scopus 로고
    • Quantum state disturbance vs. information gain: Uncertainty relations for quantum information
    • Fuchs, C. A., Peres, A.: Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information. Phys. Rev. A 53, 2038-2045 (1996)
    • (1996) Phys. Rev. A , vol.53 , pp. 2038-2045
    • Fuchs, C.A.1    Peres, A.2
  • 20
    • 0000004338 scopus 로고
    • Quantum cryptography based on orthogonal states
    • Goldenberg, L., Vaidman, L.: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 75, 1239-1243 (1995) Peres, A.: Quantum Cryptography with Orthogonal States? Phys. Rev. Lett. 77, 3264 (1996)
    • (1995) Phys. Rev. Lett. , vol.75 , pp. 1239-1243
    • Goldenberg, L.1    Vaidman, L.2
  • 21
    • 0000568953 scopus 로고    scopus 로고
    • Quantum cryptography with orthogonal states?
    • Goldenberg, L., Vaidman, L.: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 75, 1239-1243 (1995) Peres, A.: Quantum Cryptography with Orthogonal States? Phys. Rev. Lett. 77, 3264 (1996)
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 3264
    • Peres, A.1
  • 22
    • 24444470425 scopus 로고    scopus 로고
    • Reply to comment: Quantum cryptography based on orthogonal states
    • Goldenberg, L., Vaidman, L.: Reply to Comment: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 77, 3265 (1996)
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 3265
    • Goldenberg, L.1    Vaidman, L.2
  • 24
    • 84907612820 scopus 로고
    • Information gain in quantum eavesdropping
    • Huttner, B., Ekert, A. K.: Information gain in quantum eavesdropping. J. Mod. Opt. 41, 2455-2466 (1994)
    • (1994) J. Mod. Opt. , vol.41 , pp. 2455-2466
    • Huttner, B.1    Ekert, A.K.2
  • 25
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum Cryptography with Coherent States. Phys. Rev. A 51, 1863-1869 (1995)
    • (1995) Phys. Rev. A , vol.51 , pp. 1863-1869
    • Huttner, B.1    Imoto, N.2    Gisin, N.3    Mor, T.4
  • 26
    • 0001532069 scopus 로고    scopus 로고
    • Quantum cryptography based on split transmission of one-bit information in two steps
    • Koashi, M., Imoto, N.: Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps. Phys. Rev. Lett. 79, 2383-2386 (1997)
    • (1997) Phys. Rev. Lett. , vol.79 , pp. 2383-2386
    • Koashi, M.1    Imoto, N.2
  • 28
    • 0002136892 scopus 로고    scopus 로고
    • Security against eavesdropping in quantum cryptography
    • Lütkenhaus, N.: Security against eavesdropping in quantum cryptography. Phys. Rev. A 54, 97-111 (1996)
    • (1996) Phys. Rev. A , vol.54 , pp. 97-111
    • Lütkenhaus, N.1
  • 29
    • 0001619342 scopus 로고    scopus 로고
    • Estimates for practical quantum cryptography
    • Lütkenhaus, N.: Estimates for practical quantum cryptography. Phys. Rev. A 59, 3301-3319 (1999)
    • (1999) Phys. Rev. A , vol.59 , pp. 3301-3319
    • Lütkenhaus, N.1
  • 30
    • 0040163388 scopus 로고    scopus 로고
    • Security of quantum cryptography with realistic sources
    • Lütkenhaus, N.: Security of quantum cryptography with realistic sources. Acta Physica Slovaca 49, 549-556 (1999)
    • (1999) Acta Physica Slovaca , vol.49 , pp. 549-556
    • Lütkenhaus, N.1
  • 31
    • 0029357908 scopus 로고
    • Quantum key distribution over distances as long as 30 km
    • Maraud, C., Townsend, P. T.: Quantum key distribution over distances as long as 30 km. Opt. Lett. 20, 1695-1697 (1995)
    • (1995) Opt. Lett. , vol.20 , pp. 1695-1697
    • Maraud, C.1    Townsend, P.T.2
  • 34
    • 0001155383 scopus 로고
    • Quantum random-number generation and key sharing
    • Rarity, J. G., Owens, P. C. M., Tapster, P. R.: Quantum random-number generation and key sharing. J. Mod. Opt. 41, 2435-2444 (1994)
    • (1994) J. Mod. Opt. , vol.41 , pp. 2435-2444
    • Rarity, J.G.1    Owens, P.C.M.2    Tapster, P.R.3
  • 35
    • 0000005686 scopus 로고    scopus 로고
    • Security of quantum cryptography against individual attacks
    • Slutsky, B., Rao, R., Sun, P. C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A 57, 2383-2398 (1998)
    • (1998) Phys. Rev. A , vol.57 , pp. 2383-2398
    • Slutsky, B.1    Rao, R.2    Sun, P.C.3    Fainman, Y.4
  • 36
    • 33746708860 scopus 로고
    • A single quantum cannot be cloned
    • Wootters, W. K., Zurek, W. H.: A single quantum cannot be cloned. Nature 299, 802-803 (1982)
    • (1982) Nature , vol.299 , pp. 802-803
    • Wootters, W.K.1    Zurek, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.