메뉴 건너뛰기




Volumn 46, Issue 2, 2008, Pages 395-406

On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

Author keywords

[No Author keywords available]

Indexed keywords

ERROR CORRECTION; PROBES;

EID: 38349167651     PISSN: 14346060     EISSN: 14346079     Source Type: Journal    
DOI: 10.1140/epjd/e2008-00002-x     Document Type: Article
Times cited : (10)

References (34)
  • 1
    • 0036013605 scopus 로고    scopus 로고
    • N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, Rev. Mod. Phys. 74, 145 (2002)
    • (2002) Rev. Mod. Phys. , vol.74 , pp. 145
    • Gisin1
  • 6
    • 11944263767 scopus 로고
    • C.H. Bennett, G. Brassard, D.N. Mermin, Phys. Rev. Lett. 68, 557 (1992)
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 557
    • Bennett1
  • 8
    • 0029405656 scopus 로고
    • C.H. Bennett, G. Brassard, C. Crépeau, U.M. Maurer, IEEE Trans. Inf. Theory 41, 1915 (1995)
    • (1995) IEEE Trans. Inf. Theory , vol.41 , pp. 1915
    • Bennett1
  • 9
    • 33846980802 scopus 로고    scopus 로고
    • H. Inamori, N. Lütkenhaus, D. Mayers, Eur. Phys. J. D 41, 599 (2007)
    • (2007) Eur. Phys. J. D , vol.41 , pp. 599
    • Inamori1
  • 11
    • 34247501418 scopus 로고    scopus 로고
    • T. Kim, I.S. genannt Wersborg, F.N.C. Wong, J.H. Shapiro, Phys. Rev. A 75, 042327 (2007)
    • (2007) Phys. Rev. A , vol.75 , pp. 042327
    • Kim1
  • 12
    • 33144490430 scopus 로고    scopus 로고
    • J.H. Shapiro, F.N.C. Wong, Phys. Rev. A 73, 012315 (2006)
    • (2006) Phys. Rev. A , vol.73 , pp. 012315
    • Shapiro1
  • 13
    • 0000005686 scopus 로고    scopus 로고
    • B.A. Slutsky, R. Rao, P.-C. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998)
    • (1998) Phys. Rev. A , vol.57 , pp. 2383
    • Slutsky1
  • 14
    • 26944496484 scopus 로고    scopus 로고
    • H.E. Brandt, Phys. Rev. A 71, 042312 (2005)
    • (2005) Phys. Rev. A , vol.71 , pp. 042312
    • Brandt1
  • 17
    • 0001328001 scopus 로고    scopus 로고
    • C.A. Fuchs, A. Peres, Phys. Rev. A 53, 2038 (1996)
    • (1996) Phys. Rev. A , vol.53 , pp. 2038
    • Fuchs1
  • 18
    • 5344222062 scopus 로고    scopus 로고
    • C.A. Fuchs, N. Gisin, R.B. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997)
    • (1997) Phys. Rev. A , vol.56 , pp. 1163
    • Fuchs1
  • 20
    • 0036577478 scopus 로고    scopus 로고
    • E. Waks, A. Zeevi, Y. Yamamoto, Phys. Rev. A 65, 052310 (2002)
    • (2002) Phys. Rev. A , vol.65 , pp. 052310
    • Waks1
  • 22
    • 0000022642 scopus 로고
    • M.A. Neumark, Izv. Akad. Nauk. SSSR, Ser. Mat. 4, 277 (1940)
    • (1940) Ser. Mat. , vol.4 , pp. 277
    • Neumark1
  • 29
    • 0002612922 scopus 로고
    • edited by V.P. Belavkin, O. Hirota, R.L. Hudson (Plenum, New York) Proceedings of QCM94
    • L.B. Levitin, in Quantum Communication and Measurement, edited by V.P. Belavkin, O. Hirota, R.L. Hudson (Plenum, New York, 1995) pp. 439-448. Proceedings of QCM94
    • (1995) Quantum Communication and Measurement , pp. 439-448
    • Levitin, L.B.1
  • 30
    • 0001777508 scopus 로고    scopus 로고
    • C. Cachin, U.M. Maurer, J. Cryptol. 10, 97 (1997)
    • (1997) J. Cryptol. , vol.10 , pp. 97
    • Cachin1
  • 31
    • 51349163744 scopus 로고
    • R. Jozsa, J. Mod. Opt. 41, 2315 (1994)
    • (1994) J. Mod. Opt. , vol.41 , pp. 2315
    • Jozsa1
  • 32
    • 5544314772 scopus 로고
    • C.A. Fuchs, C.M. Caves, Phys. Rev. Lett. 73, 3047 (1994)
    • (1994) Phys. Rev. Lett. , vol.73 , pp. 3047
    • Fuchs1
  • 33
    • 38349088580 scopus 로고    scopus 로고
    • Quantum cryptography is hacked
    • april Online feature whose summary reads: "Simulation proves it's possible to eavesdrop on super-secure encrypted messages"
    • G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007). Online feature whose summary reads: "Simulation proves it's possible to eavesdrop on super-secure encrypted messages"
    • (2007) News @ Nature
    • Brumfiel, G.1
  • 34
    • 34249287055 scopus 로고    scopus 로고
    • G. Brumfiel, Nature 447, 372 (2007). The editor's summary starts with: "Quantum cryptography is 100% hack-proof. Or at least it was, until the hackers got cracking. Recent simulations suggest that it is only a matter of time before a quantum-mechanical method of eavesdropping on super-secure encrypted messages is developed."
    • (2007) Nature , vol.447 , pp. 372
    • Brumfiel1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.