-
1
-
-
33947385649
-
Can quantum- mechanical description of physical reality be considered complete?
-
A. Einstein, B. Podolsky, and N. Rosen, "Can quantum- mechanical description of physical reality be considered complete?," Phys. Rev. vol. 47, p. 777, 1935.
-
(1935)
Phys. Rev
, vol.47
, pp. 777
-
-
Einstein, A.1
Podolsky, B.2
Rosen, N.3
-
2
-
-
18144391224
-
Secure key from bound entanglement
-
K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, "Secure key from bound entanglement," Phys. Rev. Lett., vol. 94, p. 160502, 2005.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 160502
-
-
Horodecki, K.1
Horodecki, M.2
Horodecki, P.3
Oppenheim, J.4
-
3
-
-
0347090658
-
Simple proof of security of the bb84 quantum key distribution protocol
-
quant-ph/0003004
-
P. Shor and J. Preskill, "Simple proof of security of the bb84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, pp. 441-444, 2000, quant-ph/0003004.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
Shor, P.1
Preskill, J.2
-
4
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
quant-ph/9803006
-
H.-K. Lo and H. F. Chart, "Unconditional security of quantum key distribution over arbitrarily long distances," Science, vol. 283, pp. 2050-2056, 1999, quant-ph/9803006.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chart, H.F.2
-
5
-
-
17444398022
-
Efficient quantum key distribution scheme and proof of its unconditional security
-
H.-K. Lo, H. Chau, and M. Ardehali, "Efficient quantum key distribution scheme and proof of its unconditional security," J. Cryptology, vol. 18, pp. 133-165, 2005.
-
(2005)
J. Cryptology
, vol.18
, pp. 133-165
-
-
Lo, H.-K.1
Chau, H.2
Ardehali, M.3
-
6
-
-
33846181385
-
Security of Quantum Key Distribution,
-
Ph.D. dissertation, Swiss Fed. Inst. Technol, ETH, Zurich, Switzerland
-
R. Renner, "Security of Quantum Key Distribution," Ph.D. dissertation, Swiss Fed. Inst. Technol. (ETH), Zurich, Switzerland, 2005.
-
(2005)
-
-
Renner, R.1
-
7
-
-
0001204273
-
Reduction of quantum entropy by reversible extraction of classical information
-
C. Bennett, G. Brassard, R. Jozsa, D. Mayers, A. Peres, B. Schumacher, and W. Wootters, "Reduction of quantum entropy by reversible extraction of classical information," J. Modern Opt., vol. 41, no. 12, pp. 2307-2314, 1994.
-
(1994)
J. Modern Opt
, vol.41
, Issue.12
, pp. 2307-2314
-
-
Bennett, C.1
Brassard, G.2
Jozsa, R.3
Mayers, D.4
Peres, A.5
Schumacher, B.6
Wootters, W.7
-
8
-
-
24144445587
-
The universal composable security of quantum key distribution
-
J. Kilian, Ed. Berlin, Germany: Springer-Verlag
-
M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J. Oppenheim, "The universal composable security of quantum key distribution," in Lecture Notes in Computer Science, ser. 3378, J. Kilian, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 386-406.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.W.3
Mayers, D.4
Oppenheim, J.5
-
9
-
-
33645606783
-
Composing quantum and classical protocols
-
quant-ph/0409062
-
M. Ben-Or and D. Mayers, "Composing quantum and classical protocols," quant-ph/0409062.
-
-
-
Ben-Or, M.1
Mayers, D.2
-
10
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, Dec
-
C. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput. Syst. Signal Process., Bangalore, India, Dec. 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Comput. Syst. Signal Process
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
11
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
D. Bruss, "Optimal eavesdropping in quantum cryptography with six states," Phys. Rev. Lett., vol. 81, pp. 3018-3021, 1998.
-
(1998)
Phys. Rev. Lett
, vol.81
, pp. 3018-3021
-
-
Bruss, D.1
-
12
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
quant-ph/9604039
-
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Phys. Rev. Lett., vol. 77, p. 2818, 1996, quant-ph/9604039.
-
(1996)
Phys. Rev. Lett
, vol.77
, pp. 2818
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
13
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
14
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
Berlin, Germany: Springer-Verlag
-
D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channels," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1996, pp. 343-357.
-
(1996)
Lecture Notes in Computer Science
, pp. 343-357
-
-
Mayers, D.1
-
15
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
A. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett., vol. 67, no. 6, pp. 661-663, 1991.
-
(1991)
Phys. Rev. Lett
, vol.67
, Issue.6
, pp. 661-663
-
-
Ekert, A.1
-
16
-
-
4243216277
-
Mixed-state entanglement and quantum error correction
-
C. H. Bennett, D. P. DiVincenzo, J. Smolin, and W. K. Wootters, "Mixed-state entanglement and quantum error correction," Phys. Rev. A, Gen. Phys., vol. 54, pp. 3824-3851, 1997.
-
(1997)
Phys. Rev. A, Gen. Phys
, vol.54
, pp. 3824-3851
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.3
Wootters, W.K.4
-
17
-
-
38049015592
-
General paradigm for distilling classical key from quantum states
-
quant-ph/0506189
-
K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, "General paradigm for distilling classical key from quantum states," quant-ph/0506189.
-
-
-
Horodecki, K.1
Horodecki, M.2
Horodecki, P.3
Oppenheim, J.4
-
18
-
-
17144413068
-
Distillation of secret key and entanglement from quantum states
-
I. Devetak and A. Winter, "Distillation of secret key and entanglement from quantum states," Proc. R. Soc. Lond. A, Math. Phys. Sci., pp. 207-235, 2005.
-
(2005)
Proc. R. Soc. Lond. A, Math. Phys. Sci
, pp. 207-235
-
-
Devetak, I.1
Winter, A.2
-
19
-
-
0037574296
-
Separability criterion for density matrices
-
A. Peres, "Separability criterion for density matrices," Phys. Rev. Lett., vol. 77, p. 1413, 1996.
-
(1996)
Phys. Rev. Lett
, vol.77
, pp. 1413
-
-
Peres, A.1
-
20
-
-
0008001217
-
Mixed-state entanglement and distillation, is there a "bound" entanglement in nature?
-
M. Horodecki, P. Horodecki, and R. Horodecki, "Mixed-state entanglement and distillation, is there a "bound" entanglement in nature?," Phys. Rev. Lett., vol. 80, pp. 5239-5242, 1998.
-
(1998)
Phys. Rev. Lett
, vol.80
, pp. 5239-5242
-
-
Horodecki, M.1
Horodecki, P.2
Horodecki, R.3
-
21
-
-
33344460431
-
Quantum key distribution based on arbitrarily-weak distillable entangled states
-
K. Horodecki, D. Leung, H.-K. Lo, and J. Oppenheim, "Quantum key distribution based on arbitrarily-weak distillable entangled states," Phys. Rev. Lett., 2006, 070501.
-
(2006)
Phys. Rev. Lett
, pp. 070501
-
-
Horodecki, K.1
Leung, D.2
Lo, H.-K.3
Oppenheim, J.4
-
22
-
-
0037319628
-
Proof of security of quantum key distribution with two-way classical communications
-
Feb
-
G. Gottesman and H.-K. Lo, "Proof of security of quantum key distribution with two-way classical communications," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 457-475, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 457-475
-
-
Gottesman, G.1
Lo, H.-K.2
-
23
-
-
29744466493
-
A de Finetti representation for finite symmetric quantum states
-
quant-ph/0410229
-
R. Renner and R. Koenig, "A de Finetti representation for finite symmetric quantum states," J. Math. Phys., vol. 46, 2005, quant-ph/0410229.
-
(2005)
J. Math. Phys
, vol.46
-
-
Renner, R.1
Koenig, R.2
-
24
-
-
45249102187
-
-
Personal Communication, Sep
-
J. C. Boileau, Personal Communication, Sep. 2007.
-
(2007)
-
-
Boileau, J.C.1
-
25
-
-
0036756894
-
(1) secure quantum communication over arbitrary distances or (2) entanglement purification with noisy apparatus can be used to factor out an eavesdropper?
-
quant-ph/(1) 0008051 or (2) 0108060, 032302
-
H. Aschauer and H. J. Briegel, "(1) secure quantum communication over arbitrary distances or (2) entanglement purification with noisy apparatus can be used to factor out an eavesdropper?," Phys. Rev. A, Gen. Phys., vol. 66, 2002, quant-ph/(1) 0008051 or (2) 0108060, 032302.
-
(2002)
Phys. Rev. A, Gen. Phys
, vol.66
-
-
Aschauer, H.1
Briegel, H.J.2
-
26
-
-
27144550522
-
An information-theoretic security proof for QKD protocol
-
R. Renner, N. Gisin, and B. Kraus, "An information-theoretic security proof for QKD protocol," Phys. Rev. A, Gen. Phys., vol. 72, 2005, 012332.
-
(2005)
Phys. Rev. A, Gen. Phys
, vol.72
, pp. 012332
-
-
Renner, R.1
Gisin, N.2
Kraus, B.3
-
28
-
-
45249118362
-
Better codes for bb84 with one-way post-processing
-
quant-ph/0607018
-
G. Smith, J. Renes, and J. Smolin, "Better codes for bb84 with one-way post-processing," quant-ph/0607018.
-
-
-
Smith, G.1
Renes, J.2
Smolin, J.3
-
29
-
-
19844376567
-
A generic security proof for quantum key distribution
-
quant-ph/0402131
-
M. Christandl, R. Renner, and A. Ekert, "A generic security proof for quantum key distribution," quant-ph/0402131.
-
-
-
Christandl, M.1
Renner, R.2
Ekert, A.3
-
30
-
-
45249102425
-
-
K. Horodecki, M. Horodecki, P. Horodecki, D. W. Leung, H.-K. Lo, and J. Oppenheim, Unconditionally secure privacy using channels that cannot convey quantum information, in QIP, Paris, France, 2006.
-
K. Horodecki, M. Horodecki, P. Horodecki, D. W. Leung, H.-K. Lo, and J. Oppenheim, "Unconditionally secure privacy using channels that cannot convey quantum information," in QIP, Paris, France, 2006.
-
-
-
-
31
-
-
85051912796
-
Noisy preprocessing and the distillation of twisted states
-
quant-ph/0603262
-
J. Renes and G. Smith, "Noisy preprocessing and the distillation of twisted states," Phys. Rev. Lett., 2007, quant-ph/0603262.
-
(2007)
Phys. Rev. Lett
-
-
Renes, J.1
Smith, G.2
-
32
-
-
27144544067
-
Lower and upper bounds on the secret key rate for QKD protocols using one-way classical communication
-
B. Kraus, N. Gisin, and R. Renner, "Lower and upper bounds on the secret key rate for QKD protocols using one-way classical communication," Phys. Rev. Lett., vol. 95, 2005, 080501.
-
(2005)
Phys. Rev. Lett
, vol.95
, pp. 080501
-
-
Kraus, B.1
Gisin, N.2
Renner, R.3
-
33
-
-
40949153363
-
Unconditional privacy over channels which cannot convey quantum information
-
K. Horodecki, M. Horodecki, P. Horodecki, D. Leung, and J. Oppenheim, "Unconditional privacy over channels which cannot convey quantum information," Phys. Rev. Lett., 2008, 110502.
-
(2008)
Phys. Rev. Lett
, pp. 110502
-
-
Horodecki, K.1
Horodecki, M.2
Horodecki, P.3
Leung, D.4
Oppenheim, J.5
-
34
-
-
0141803639
-
The 'transition probability' in the state space of a *algebra
-
A. Uhlmann, "The 'transition probability' in the state space of a *algebra," Rep. Math. Phys., vol. 9, pp. 273-279, 1976.
-
(1976)
Rep. Math. Phys
, vol.9
, pp. 273-279
-
-
Uhlmann, A.1
-
35
-
-
4444337898
-
Reliability of calderbank-shor-steane codes and security of quantum key distribution
-
quant-ph/0308029
-
M. Hamada, "Reliability of calderbank-shor-steane codes and security of quantum key distribution," J. Phys. A, Math. Gen., no. 34, 2004, quant-ph/0308029.
-
(2004)
J. Phys. A, Math. Gen
, Issue.34
-
-
Hamada, M.1
-
36
-
-
45249100636
-
Low dimensional bound entanglement with one-way distillable cryptographic key
-
quant-ph/0506203
-
K. Horodecki, L. Pankowski, M. Horodecki, and P. Horodecki, "Low dimensional bound entanglement with one-way distillable cryptographic key," quant-ph/0506203.
-
-
-
Horodecki, K.1
Pankowski, L.2
Horodecki, M.3
Horodecki, P.4
-
37
-
-
0034652063
-
Binding entanglement channels
-
P. Horodecki, M. Horodecki, and R. Horodecki, "Binding entanglement channels," Phys. Rev. Lett., vol. 47, pp. 347-354, 2000.
-
(2000)
Phys. Rev. Lett
, vol.47
, pp. 347-354
-
-
Horodecki, P.1
Horodecki, M.2
Horodecki, R.3
|