-
1
-
-
85027496257
-
-
G. Brassard and L. Salvail, Secret-key reconciliation by public discussion, in Advances of Cryptology - EUROCRYPT '93, ser. Lecture Notes in Computer Science, T. Helleseth, Ed., 765, Lofthus, Norway, 1994, pp. 410-423.
-
G. Brassard and L. Salvail, "Secret-key reconciliation by public discussion," in Advances of Cryptology - EUROCRYPT '93, ser. Lecture Notes in Computer Science, T. Helleseth, Ed., vol. 765, Lofthus, Norway, 1994, pp. 410-423.
-
-
-
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. on Inform. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. on Inform. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
3
-
-
0037319628
-
Proof of security of quantum key distribution with two-way classical communication
-
arXive:quant-ph/0105121, Feb
-
D. Gottesman and H. K. Lo, "Proof of security of quantum key distribution with two-way classical communication," IEEE Trans. Inform. Theory, vol. 49, no. 2, pp. 457-475, Feb. 2003, arXive:quant-ph/0105121.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.2
, pp. 457-475
-
-
Gottesman, D.1
Lo, H.K.2
-
4
-
-
0036997507
-
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
-
arXive:quant-ph/0205060, Dec
-
H. F. Chau, "Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate," Phys. Rev. A, vol. 66, no. 6, p. 060302, Dec. 2002, arXive:quant-ph/0205060.
-
(2002)
Phys. Rev. A
, vol.66
, Issue.6
, pp. 060302
-
-
Chau, H.F.1
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
6
-
-
26944431922
-
Interpolation of recurrence and hashing entanglement distillation protocols
-
arXive:quant-ph/0404111, June
-
K. G. H. Vollbrecht and F. Vestraete, "Interpolation of recurrence and hashing entanglement distillation protocols," Phys. Rev. A, vol. 71, no. 6, p. 062325, June 2005, arXive:quant-ph/0404111.
-
(2005)
Phys. Rev. A
, vol.71
, Issue.6
, pp. 062325
-
-
Vollbrecht, K.G.H.1
Vestraete, F.2
-
7
-
-
3042620599
-
Method for decoupling error correction from privacy amplification
-
arXive:quant-ph/0201030, Apr
-
H. K. Lo, "Method for decoupling error correction from privacy amplification," New Journal of Physics, vol. 5, p. 36, Apr. 2003, arXive:quant-ph/0201030.
-
(2003)
New Journal of Physics
, vol.5
, pp. 36
-
-
Lo, H.K.1
-
8
-
-
33748998157
-
Decoy-state quantum key distribution with two-way classical postprocessing
-
arXive:quant-ph/0604094, Sep
-
X. Ma, C. H. F. Fung, F. Dupuis, K. Chen, K. Tamaki, and H. K. Lo, "Decoy-state quantum key distribution with two-way classical postprocessing," Phys. Rev. A, vol. 74, no. 3, p. 032330, Sep. 2006, arXive:quant-ph/0604094.
-
(2006)
Phys. Rev. A
, vol.74
, Issue.3
, pp. 032330
-
-
Ma, X.1
Fung, C.H.F.2
Dupuis, F.3
Chen, K.4
Tamaki, K.5
Lo, H.K.6
-
9
-
-
51649091058
-
Security of quantum key distribution protocol with two-way classical communication assisted by one-time pad encryption
-
Beijing, China, arXive:quant-ph/0608030
-
S. Watanabe, R. Matsumoto, and T. Uyematsu, "Security of quantum key distribution protocol with two-way classical communication assisted by one-time pad encryption," in Proc. of AQIS 2006, Beijing, China, 2006, pp. 11-12, arXive:quant-ph/0608030.
-
(2006)
Proc. of AQIS 2006
, pp. 11-12
-
-
Watanabe, S.1
Matsumoto, R.2
Uyematsu, T.3
-
10
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
arXive:quant-ph/0003004, July
-
P. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, no. 2, pp. 441-444, July 2000, arXive:quant-ph/0003004.
-
(2000)
Phys. Rev. Lett
, vol.85
, Issue.2
, pp. 441-444
-
-
Shor, P.1
Preskill, J.2
-
11
-
-
0013207242
-
Proof of unconditional security of six-state quantum key distribution scheme
-
arXive:quant-ph/0102138, Aug
-
H. K. Lo, "Proof of unconditional security of six-state quantum key distribution scheme," Quant. Inform. Comput., vol. 1, no. 2, pp. 81-94, Aug. 2001, arXive:quant-ph/0102138.
-
(2001)
Quant. Inform. Comput
, vol.1
, Issue.2
, pp. 81-94
-
-
Lo, H.K.1
-
12
-
-
51649112814
-
Unifying classical and quantum key distillation
-
arXive:quant-ph/0608199
-
M. Christandl, A. Ekert, M. Horodecki, P. Horodecki, J. Oppenheim, and R. Renner, "Unifying classical and quantum key distillation," arXive:quant-ph/0608199.
-
-
-
Christandl, M.1
Ekert, A.2
Horodecki, M.3
Horodecki, P.4
Oppenheim, J.5
Renner, R.6
-
13
-
-
27144550522
-
Information-theoretic security proof for quantum-key-distribution protocols
-
arXive:quant-ph/05 02064, July
-
R. Renner, N. Gisin, and B. Kraus, "Information-theoretic security proof for quantum-key-distribution protocols," Phys. Rev. A, vol. 72, no. 1, p. 012332, July 2005, arXive:quant-ph/05 02064.
-
(2005)
Phys. Rev. A
, vol.72
, Issue.1
, pp. 012332
-
-
Renner, R.1
Gisin, N.2
Kraus, B.3
-
14
-
-
0020152829
-
Linear codes for sources and source networks: Error exponents, universal coding
-
July
-
I. Csiszár, "Linear codes for sources and source networks: error exponents, universal coding," IEEE Trans. Inform. Theory, vol. 28, no. 4, pp. 585-592, July 1982.
-
(1982)
IEEE Trans. Inform. Theory
, vol.28
, Issue.4
, pp. 585-592
-
-
Csiszár, I.1
-
15
-
-
4444337898
-
Reliability of Calderbank-Shor-Stean codes and security of quantum key distribution
-
arXive:quant-ph/0308029, Aug
-
M. Hamada, "Reliability of Calderbank-Shor-Stean codes and security of quantum key distribution," J. Phys. A: Math. Gen., vol. 37, no. 34, pp. 8303-8328, Aug. 2004, arXive:quant-ph/0308029.
-
(2004)
J. Phys. A: Math. Gen
, vol.37
, Issue.34
, pp. 8303-8328
-
-
Hamada, M.1
-
16
-
-
27144544067
-
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication
-
arXive:quant-ph/0410215, Aug
-
B. Kraus, N. Gisin, and R. Renner, "Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication," Phys. Rev. Lett., vol. 95, no. 8, p. 080501, Aug. 2005, arXive:quant-ph/0410215.
-
(2005)
Phys. Rev. Lett
, vol.95
, Issue.8
, pp. 080501
-
-
Kraus, B.1
Gisin, N.2
Renner, R.3
-
18
-
-
84888056322
-
-
_, Symmetry implies independence, 2007, arXive:quant-ph/ 0703069.
-
_, "Symmetry implies independence," 2007, arXive:quant-ph/ 0703069.
-
-
-
-
19
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
arXive:quant-ph/9805019, Oct
-
D. Bruß, "Optimal eavesdropping in quantum cryptography with six states," Phys. Rev. Lett., vol. 81, no. 14, pp. 3018-3021, Oct. 1998, arXive:quant-ph/9805019.
-
(1998)
Phys. Rev. Lett
, vol.81
, Issue.14
, pp. 3018-3021
-
-
Bruß, D.1
-
20
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Computers Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Computers Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
21
-
-
0015648934
-
Noiseless coding of correlated information sources
-
July
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. 19, no. 4, pp. 471-480, July 1973.
-
(1973)
IEEE Trans. Inform. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
|