-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, December
-
C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proc. of IEEE Int. Conference on Computers, Systems, and Signal Processing (Bangalore, India), December 1984, pp. 175-179.
-
(1984)
Proc. of IEEE Int. Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
A. K. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. 67 (1991), 661.
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
3
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Rev. Mod. Phys. 74 (2002), 145.
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
4
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers, Unconditional security in quantum cryptography, J. of ACM 48 (2001), 351-406,
-
(2001)
J. of ACM
, vol.48
, pp. 351-406
-
-
Mayers, D.1
-
5
-
-
84955621476
-
-
Preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto '96, 1109 of Lecture Notes in Computer Science, Koblitz, N. Ed. (Springer-Verlag, New York, 1996), pp. 343-357.
-
Preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto '96, vol. 1109 of Lecture Notes in Computer Science, Koblitz, N. Ed. (Springer-Verlag, New York, 1996), pp. 343-357.
-
-
-
-
6
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283 (1999), 2050-2056.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
7
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85 (2000), 441.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
8
-
-
0026626314
-
Experimental quantum cryptography
-
C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum cryptography, J. Cryptology 5 (1992), 3-28.
-
(1992)
J. Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
9
-
-
0035841898
-
Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
-
S. Felix, N. Gisin, A. Stefanov, and H. Zbinden, Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses, J. Mod. Opt. 48 (2001), 2009-2021.
-
(2001)
J. Mod. Opt
, vol.48
, pp. 2009-2021
-
-
Felix, S.1
Gisin, N.2
Stefanov, A.3
Zbinden, H.4
-
10
-
-
0343536431
-
Limitations on Practical Quantum Cryptography
-
G. Brassard, N. Lütkenhaus, T. Mor, and B.C. Sanders, Limitations on Practical Quantum Cryptography, Phys. Rev. Lett. 85 (2000), 1330-1333.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330-1333
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
11
-
-
0347111146
-
Security against individual attacks for realistic quantum key distribution
-
N. Lütkenhaus, Security against individual attacks for realistic quantum key distribution, Phys. Rev. A 61(2000), 052304.
-
(2000)
Phys. Rev. A
, vol.61
, pp. 052304
-
-
Lütkenhaus, N.1
-
13
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Security of quantum key distribution with imperfect devices, Quantum Information and Computation 5 (2004), 325-360.
-
(2004)
Quantum Information and Computation
, vol.5
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
14
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.-Y. Hwang, Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett. 91 (2003), 057901.
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
16
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K. Lo, X. Ma, and K. Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94 (2005), 230504.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
17
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
X.-B. Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94 (2005), 230503.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
18
-
-
27144453296
-
Practical decoy state for quantum key distribution
-
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Practical decoy state for quantum key distribution. Phys. Rev. A 72 (2005), 012326.
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012326
-
-
Ma, X.1
Qi, B.2
Zhao, Y.3
Lo, H.-K.4
-
19
-
-
27144532069
-
Decoy-state protocol for quantum cryptography with four different intensities of coherent light
-
X.-B. Wang, Decoy-state protocol for quantum cryptography with four different intensities of coherent light, Phys. Rev. A 72 (2005), 012322.
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012322
-
-
Wang, X.-B.1
-
21
-
-
33344454530
-
Experimental quantum key distribution with decoy states
-
Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, Experimental quantum key distribution with decoy states, Phys. Rev. Lett. 96 (2006), 070502.
-
(2006)
Phys. Rev. Lett
, vol.96
, pp. 070502
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
22
-
-
3142514656
-
Photon counting at telecom wavelengths with commercial InGaAs/InP avalanche photodiodes: Current performance
-
G. Ribordy, N. Gisin, O. Guinnard, D. Stucki, M. Wegmuller, and H. Zbinden, Photon counting at telecom wavelengths with commercial InGaAs/InP avalanche photodiodes: current performance, J. Mod. Opt. 51 (2004), 1381-1398.
-
(2004)
J. Mod. Opt
, vol.51
, pp. 1381-1398
-
-
Ribordy, G.1
Gisin, N.2
Guinnard, O.3
Stucki, D.4
Wegmuller, M.5
Zbinden, H.6
-
24
-
-
27844566291
-
Faked states attack on quantum cryptosystems
-
V. Makarov and D. R. Hjelme, Faked states attack on quantum cryptosystems, J. Mod. Opt. 52 (2005), 691-705.
-
(2005)
J. Mod. Opt
, vol.52
, pp. 691-705
-
-
Makarov, V.1
Hjelme, D.R.2
-
25
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U. M. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inf. Theory 45 (1999), 499-514.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
26
-
-
0029357908
-
Quantum key distribution over distance as long as 30km
-
C. Marand and P. D. Townsend, Quantum key distribution over distance as long as 30km, Opt. Lett. 20 (1995), 1695-1697.
-
(1995)
Opt. Lett
, vol.20
, pp. 1695-1697
-
-
Marand, C.1
Townsend, P.D.2
-
27
-
-
4043164377
-
Real-time phase tracking in single-photon interferometers
-
V. Makarov, A. Brylevski, and D. R. Hjelme, Real-time phase tracking in single-photon interferometers, App. Opt. 43 (2004), 4385-4392.
-
(2004)
App. Opt
, vol.43
, pp. 4385-4392
-
-
Makarov, V.1
Brylevski, A.2
Hjelme, D.R.3
-
28
-
-
0034652057
-
Quantum key distribution over a 48km optical fiber network
-
R. J. Hughes, G. L. Morgan, and C. G. Peterson, Quantum key distribution over a 48km optical fiber network, J. Mod. Opt.47(2000), 533-547.
-
(2000)
J. Mod. Opt
, vol.47
, pp. 533-547
-
-
Hughes, R.J.1
Morgan, G.L.2
Peterson, C.G.3
-
29
-
-
13544277609
-
Continuous operation of a one-way quantum key distribution system over installed telecom fibre
-
Z. L. Yuan and A. J. Shields, Continuous operation of a one-way quantum key distribution system over installed telecom fibre, Opt. Express 13 (2005), 660-665.
-
(2005)
Opt. Express
, vol.13
, pp. 660-665
-
-
Yuan, Z.L.1
Shields, A.J.2
-
30
-
-
33846189366
-
-
In the first version, we proposed an attack on this type QKD system by tampering both the synchronization pulse and signal pulse. As pointed out by an anonymous reviewer, in this case. the time-shifted pulse may be modulated by Bob's phase modulator incorrectly
-
In the first version, we proposed an attack on this type QKD system by tampering both the synchronization pulse and signal pulse. As pointed out by an anonymous reviewer, in this case. the time-shifted pulse may be modulated by Bob's phase modulator incorrectly.
-
-
-
-
31
-
-
0028428439
-
Secure key distribution system based on quantum cryptography
-
P. Townsend, Secure key distribution system based on quantum cryptography, Electr. Lett. 30(1994), 809-811.
-
(1994)
Electr. Lett
, vol.30
, pp. 809-811
-
-
Townsend, P.1
-
32
-
-
33846203946
-
Secure use of a single single-photon detector in a QKD system
-
US patent application 20050190922
-
M. J. LaGasse, Secure use of a single single-photon detector in a QKD system, US patent application 20050190922 (2005).
-
(2005)
-
-
LaGasse, M.J.1
-
33
-
-
0035841908
-
Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
-
A. Vakhitov, V. Makarov and D. R. Hjelme, Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt. 48 (2001), 2023-2038.
-
(2001)
J. Mod. Opt
, vol.48
, pp. 2023-2038
-
-
Vakhitov, A.1
Makarov, V.2
Hjelme, D.R.3
-
35
-
-
33846208750
-
-
For example, Alice/Bob may produce one key with QKD system and another key with conventional cryptosystem. They can produce the final key by doing a XOR operation. Eve has to break both the two systems to get the final key.
-
For example, Alice/Bob may produce one key with QKD system and another key with conventional cryptosystem. They can produce the final key by doing a "XOR" operation. Eve has to break both the two systems to get the final key.
-
-
-
|