메뉴 건너뛰기




Volumn 48, Issue 3, 2001, Pages 351-406

Unconditional security in quantum cryptography

Author keywords

Quantum cryptography; Quantum information theory; Unconditional security

Indexed keywords

QUANTUM COMMUNICATION; QUANTUM COMPUTERS; QUANTUM KEY DISTRIBUTION; UNCONDITIONAL SECURITY;

EID: 3042730516     PISSN: 00045411     EISSN: None     Source Type: Journal    
DOI: 10.1145/382780.382781     Document Type: Article
Times cited : (859)

References (28)
  • 1
    • 34547688445 scopus 로고    scopus 로고
    • Complexity issues in coding theory
    • (ISSN 1433-8092, 4th Year, 46th Report)
    • BARG, A. 1997. Complexity issues in coding theory. Electronic Colloquium on Computational Complexity Report TR97-046 (ISSN 1433-8092, 4th Year, 46th Report), ftp://ftp.eccc.uni-trier.de/pub/eccc/reports/1997/TR97-046/index.html.
    • (1997) Electronic Colloquium on Computational Complexity Report , vol.TR97-046
    • Barg, A.1
  • 2
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • May 25, 1992
    • BENNETT, C. H. 1992. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 21, May 25, 1992, 3121-2124.
    • (1992) Phys. Rev. Lett. , vol.68 , Issue.21 , pp. 3121-12124
    • Bennett, C.H.1
  • 7
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • BENNETT, C. H., BRASSARD, G., AND ROBERT, J.-M. 1988. Privacy amplification by public discussion. SIAM J. Comput. 17, 2 (Apr.). 210-229.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 APR. , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 8
    • 0003432201 scopus 로고    scopus 로고
    • Security of quantum key distribution against all collective attacks
    • quant-ph/9801022
    • BIHAM, E., BOYER, M., BRASSARD, G., VAN DE GRAAF, J., AND MOR, T. 1998. Security of quantum key distribution against all collective attacks. LANL archives quant-ph/9801022.
    • (1998) LANL Archives
    • Biham, E.1    Boyer, M.2    Brassard, G.3    Van De Graaf, J.4    Mor, T.5
  • 9
    • 0001452279 scopus 로고    scopus 로고
    • On the security of quantum cryptography against collective attacks
    • BIHAM, E., AND MOR, T. 1996. On the security of quantum cryptography against collective attacks. Phys. Rev. Lett. 78, pp. 2256-2259.
    • (1996) Phys. Rev. Lett. , vol.78 , pp. 2256-2259
    • Biham, E.1    Mor, T.2
  • 10
    • 0012182948 scopus 로고    scopus 로고
    • Cryptology column - 25 years of quantum cryptography
    • BRASSARD, G., AND CREEPEAU, C. 1996. Cryptology column - 25 years of quantum cryptography. SIGACT News 27, 3 (Sept.). 13-24.
    • (1996) SIGACT News , vol.27 , Issue.3 SEPT. , pp. 13-24
    • Brassard, G.1    Creepeau, C.2
  • 12
    • 84861951323 scopus 로고    scopus 로고
    • Perfectly concealing quantum bit commitment from any quantum one-way permutation
    • to be published
    • DUMAIS, P., SALVAIL, L., AND MAYERS, D. 2000. Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Eurocrypt '2000. (to be published).
    • (2000) Eurocrypt '2000
    • Dumais, P.1    Salvail, L.2    Mayers, D.3
  • 13
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • EKERT, A. 1991. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.1
  • 15
    • 0039284827 scopus 로고
    • The computational complexity of machine learning
    • MIT Press, Original proof in: H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. (1952)
    • KEARNS, M. J. 1989. The computational complexity of machine learning. MIT Press, (Original proof in: H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493 (1952).
    • (1989) Ann. Math. Stat. , vol.23 , pp. 493
    • Kearns, M.J.1
  • 18
    • 84957696255 scopus 로고
    • On the security of the quantum oblivious transfer and key distribution protocols
    • Springer-Verlag, New York
    • MAYERS, D. 1995. On the security of the quantum oblivious transfer and key distribution protocols. Advances in Cryptology - Proceedings of Crypto '95 (Aug.). Springer-Verlag, New York, pp. 124-135.
    • (1995) Advances in Cryptology - Proceedings of Crypto '95 , Issue.AUG. , pp. 124-135
    • Mayers, D.1
  • 19
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • Springer-Verlag, New York
    • MAYERS, D. 1996. Quantum key distribution and string oblivious transfer in noisy channels. Advances in Cryptology - Proceedings of Crypto '96 (Aug.). Springer-Verlag, New York, pp. 343-357.
    • (1996) Advances in Cryptology - Proceedings of Crypto '96 , Issue.AUG. , pp. 343-357
    • Mayers, D.1
  • 20
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • MAYERS, D. 1997. Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 17 (Apr.), pp. 3414-3417.
    • (1997) Phys. Rev. Lett. , vol.78 , Issue.17 APR. , pp. 3414-3417
    • Mayers, D.1
  • 22
    • 4243120103 scopus 로고    scopus 로고
    • Quantum key distribution is unconditionally secure
    • in preparation
    • MAYERS, D. 2001b. Quantum key distribution is unconditionally secure. Tech. Rep. (in preparation).
    • (2001) Tech. Rep.
    • Mayers, D.1
  • 26
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • SHOR, P. W., AND PRESKILL, J. 2000. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441.
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 27
    • 0019572642 scopus 로고
    • New hash function and their use in authentication and set equality
    • WEGMAN, M. N., AND CARTER, J. L. 1981. New hash function and their use in authentication and set equality, J. Comput. Syst. Sci. 22, 265-279.
    • (1981) J. Comput. Syst. Sci. , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.