-
1
-
-
0000600063
-
Quantum cryptography with coherent states
-
B. Huttner, N. Imoto, N. Gisin and T. Mor (1995), Quantum cryptography with coherent states, Phys. Rev. A 51, pp. 1863.
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
2
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India IEEE Press, New York, pp
-
C. H. Bennett and G. Brassard (1984), Quantum cryptography: public key distribution and coin tossing, Proc. IEEE Int. Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE Press, New York), pp. 175.
-
(1984)
Proc. IEEE Int. Conference on Computers, Systems and Signal Processing
, pp. 175
-
-
Bennett, C.H.1
Brassard, G.2
-
3
-
-
33846980802
-
Unconditional security of practical quantum key distribution,Eur
-
H. Inamori, N. Lütkenhaus and D. Mayers (2007), Unconditional security of practical quantum key distribution,Eur. Phys. J. D 41, pp. 599.
-
(2007)
Phys. J. D
, vol.41
, pp. 599
-
-
Inamori, H.1
Lütkenhaus, N.2
Mayers, D.3
-
4
-
-
7044249607
-
-
Quant. Inf. Comp
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus and J. Preskill (2004), Security of quantum key distribution with imperfect devices, Quant. Inf. Comp. 4, pp. 325.
-
(2004)
Security of quantum key distribution with imperfect devices
, vol.4
, pp. 325
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
5
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.-Y. Hwang (2003), Quantum key distribution with high loss: toward global secure communication, Phys. Rev. Lett. 91, pp. 057901;
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
6
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K. Lo, X. Ma and K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett. 94, pp. 230504;
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
7
-
-
27744568650
-
Beating the Photon-Number- Splitting attack in practical quantum cryptography
-
X.-B. Wang (2005), Beating the Photon-Number- Splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94, pp. 230503.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
8
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett (1992), Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, pp. 3121.
-
(1992)
Phys. Rev. Lett
, vol.68
, pp. 3121
-
-
Bennett, C.H.1
-
9
-
-
19644377760
-
Unconditional security ofcoherent-state quantum key distribution with a strong phase-reference pulse
-
M. Koashi (2004), Unconditional security ofcoherent-state quantum key distribution with a strong phase-reference pulse, Phys. Rev. Lett. 93, pp. 120501;
-
(2004)
Phys. Rev. Lett
, vol.93
, pp. 120501
-
-
Koashi, M.1
-
10
-
-
34547516163
-
Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse
-
quant-ph/0607082
-
K. Tamaki, N. Lütkenhaus, M. Koashi and J. Batuwantudawe (2006), Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse, quant-ph/0607082.
-
(2006)
-
-
Tamaki, K.1
Lütkenhaus, N.2
Koashi, M.3
Batuwantudawe, J.4
-
11
-
-
0037101027
-
Differential phase shift quantum key distribution
-
K. Inoue, E. Waks and Y. Yamamoto (2002), Differential phase shift quantum key distribution, Phys.Rev.Lett. 89, pp. 037902;
-
(2002)
Phys.Rev.Lett
, vol.89
, pp. 037902
-
-
Inoue, K.1
Waks, E.2
Yamamoto, Y.3
-
12
-
-
85166988251
-
-
K. Inoue, E. Waks and Y. Yamamoto (2003), Differential-phase- shift quantum key distribution using coherent light,Phys.Rev.A68, pp. 022317.
-
K. Inoue, E. Waks and Y. Yamamoto (2003), Differential-phase- shift quantum key distribution using coherent light,Phys.Rev.A68, pp. 022317.
-
-
-
-
13
-
-
33144478746
-
Security of differential-phase-shift quantum key distribution against individual attacks,Phys
-
E. Waks, H. Takesue and Y. Yamamoto (2006), Security of differential-phase-shift quantum key distribution against individual attacks,Phys. Rev. A 73, pp. 012344.
-
(2006)
Rev. A
, vol.73
, pp. 012344
-
-
Waks, E.1
Takesue, H.2
Yamamoto, Y.3
-
14
-
-
38649131324
-
Upper bounds for the security of two distributed- phase reference protocols of quantum cryptography
-
C. Branciard, N. Gisin and V. Scarani (2008), Upper bounds for the security of two distributed- phase reference protocols of quantum cryptography, New J. Phys. 10, pp. 013031.
-
(2008)
New J. Phys
, vol.10
, pp. 013031
-
-
Branciard, C.1
Gisin, N.2
Scarani, V.3
-
15
-
-
34547512551
-
-
Quant. Inf. Comp
-
M. Curty, L. L. Zhang, H-K Lo and N. Lütkenhaus (2007), Sequential attacks against differential- phase-shift quantum key distribution with coherent states, Quant. Inf. Comp. 7, pp. 665.
-
(2007)
Sequential attacks against differential- phase-shift quantum key distribution with coherent states
, vol.7
, pp. 665
-
-
Curty, M.1
Zhang, L.L.2
Lo, H.-K.3
Lütkenhaus, N.4
-
16
-
-
34547373980
-
Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol
-
T. Tsurumaru (2007), Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol, Phys.Rev.A75, pp. 062319.
-
(2007)
Phys.Rev.A
, vol.75
, pp. 062319
-
-
Tsurumaru, T.1
-
17
-
-
43949084413
-
Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks,Phys
-
M. Curty, K. Tamaki and T. Moroder (2008), Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks,Phys. Rev. A 77, pp. 052321.
-
(2008)
Rev. A
, vol.77
, pp. 052321
-
-
Curty, M.1
Tamaki, K.2
Moroder, T.3
-
18
-
-
27744485456
-
Differential phase shift quantum key distribution experiment over 105 km fibre
-
H. Takesue, E. Diamanti, T. Honjo, C. Langrock, M. M. Fejer, K. Inoue and Y. Yamamoto (2005), Differential phase shift quantum key distribution experiment over 105 km fibre, New J. Phys. 7, pp. 232.
-
(2005)
New J. Phys
, vol.7
, pp. 232
-
-
Takesue, H.1
Diamanti, E.2
Honjo, T.3
Langrock, C.4
Fejer, M.M.5
Inoue, K.6
Yamamoto, Y.7
-
19
-
-
33845749064
-
100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors,Opt
-
E. Diamanti, H. Takesue, C. Langrock, M. M. Fejer and Y. Yamamoto (2006), 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors,Opt. Express 14, pp. 13073.
-
(2006)
Express
, vol.14
, pp. 13073
-
-
Diamanti, E.1
Takesue, H.2
Langrock, C.3
Fejer, M.M.4
Yamamoto, Y.5
-
20
-
-
85167067989
-
-
Ph.D Thesis, Stanford University
-
E. Diamanti (2006), Ph.D Thesis, Stanford University.
-
(2006)
-
-
Diamanti, E.1
-
21
-
-
34249869818
-
Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors
-
H. Takesue, S. W. Nam, Q. Zhang, R. H. Hadfield, T. Honjo, K. Tamaki and Y. Yamamoto (2007), Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors, Nature Photonics 1, pp. 343.
-
(2007)
Nature Photonics
, vol.1
, pp. 343
-
-
Takesue, H.1
Nam, S.W.2
Zhang, Q.3
Hadfield, R.H.4
Honjo, T.5
Tamaki, K.6
Yamamoto, Y.7
-
22
-
-
0000643186
-
How to differentiate between non-orthogonal states
-
I. D. Ivanovic (1987), How to differentiate between non-orthogonal states, Phys. Lett. A 123, pp. 257;
-
(1987)
Phys. Lett. A
, vol.123
, pp. 257
-
-
Ivanovic, I.D.1
-
23
-
-
0000691940
-
Overlap and distinguishability of quantum states
-
D. Dieks (1988), Overlap and distinguishability of quantum states, Phys. Lett. A 126, pp. 303;
-
(1988)
Phys. Lett. A
, vol.126
, pp. 303
-
-
Dieks, D.1
-
24
-
-
0002027240
-
How to differentiate between non-orthogonal states
-
A. Peres (1988), How to differentiate between non-orthogonal states, Phys. Lett. A 128, pp. 19;
-
(1988)
Phys. Lett. A
, vol.128
, pp. 19
-
-
Peres, A.1
-
25
-
-
0002326347
-
Optimal distinction between two non-orthogonal quantum states
-
G. Jaeger and A. Shimony (1995), Optimal distinction between two non-orthogonal quantum states, Phys. Lett. A 197, pp. 83.
-
(1995)
Phys. Lett. A
, vol.197
, pp. 83
-
-
Jaeger, G.1
Shimony, A.2
-
26
-
-
0347417034
-
Optimum unambiguous discrimination between linearly independent symmetric states
-
A. Chefles and S. M. Barnett (1998), Optimum unambiguous discrimination between linearly independent symmetric states, Phys. Lett. A 250, pp. 223.
-
(1998)
Phys. Lett. A
, vol.250
, pp. 223
-
-
Chefles, A.1
Barnett, S.M.2
-
27
-
-
0342844378
-
Unambiguous state discrimination in quantum cryptography with weak coherent states
-
M. Dušek, M. Jahma and N. Lütkenhaus (2000), Unambiguous state discrimination in quantum cryptography with weak coherent states, Phys. Rev. A62, pp. 022306.
-
(2000)
Phys. Rev. A
, vol.62
, pp. 022306
-
-
Dušek, M.1
Jahma, M.2
Lütkenhaus, N.3
-
28
-
-
38349129346
-
-
quant-ph/0802.4155
-
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus and M. Peev (2008), A framework for practical quantum cryptography, quant-ph/0802.4155.
-
(2008)
A framework for practical quantum cryptography
-
-
Scarani, V.1
Bechmann-Pasquinucci, H.2
Cerf, N.J.3
Dušek, M.4
Lütkenhaus, N.5
Peev, M.6
-
29
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel and H. Zbinden (2002), Quantum cryptography, Rev. Mod. Phys. 74, pp. 145;
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
30
-
-
85166996678
-
-
M. Dušek, N. Lütkenhaus and M. Hendrych (2006), Quantum cryptography, Prog. Opt. 49, Edt. E. Wolf (Elsevier), pp. 381
-
M. Dušek, N. Lütkenhaus and M. Hendrych (2006), Quantum cryptography, Prog. Opt. 49, Edt. E. Wolf (Elsevier), pp. 381
-
-
-
-
31
-
-
85166993426
-
-
M. Horodecki, P. W. Shor and M. B. Ruskai (2003), Entanglement breaking channels,Rev.Math. Phys. 15, pp. 629; M. B. Ruskai (2003), Qubit entanglement breaking channels,Rev.Math.Phys. 15, pp. 643.
-
M. Horodecki, P. W. Shor and M. B. Ruskai (2003), Entanglement breaking channels,Rev.Math. Phys. 15, pp. 629; M. B. Ruskai (2003), Qubit entanglement breaking channels,Rev.Math.Phys. 15, pp. 643.
-
-
-
-
32
-
-
3142519923
-
Entanglement as a precondition for secure quantum key distribution
-
M. Curty, M. Lewenstein and N. Lütkenhaus (2004), Entanglement as a precondition for secure quantum key distribution, Phys. Rev. Lett. 92, pp. 217903;
-
(2004)
Phys. Rev. Lett
, vol.92
, pp. 217903
-
-
Curty, M.1
Lewenstein, M.2
Lütkenhaus, N.3
-
33
-
-
33344457494
-
Detecting two-party correlations in quantum key distribution protocols
-
M. Curty, O. Gühne, M. Lewenstein and N. Lütkenhaus (2005), Detecting two-party correlations in quantum key distribution protocols, Phys. Rev. A 71, pp. 022306.
-
(2005)
Phys. Rev. A
, vol.71
, pp. 022306
-
-
Curty, M.1
Gühne, O.2
Lewenstein, M.3
Lütkenhaus, N.4
-
34
-
-
0026220377
-
Geometrically uniform codes
-
G. D. Forney (1991), Geometrically uniform codes, IEEE Trans. Inform. Theory 37, pp. 1241;
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, pp. 1241
-
-
Forney, G.D.1
-
35
-
-
0035270460
-
On quantum detection and the square-root measurement
-
Y. C. Eldar and G. D. Forney (2001), On quantum detection and the square-root measurement, IEEE Trans. Inform. Theory 47, pp. 858;
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 858
-
-
Eldar, Y.C.1
Forney, G.D.2
-
37
-
-
0037321338
-
A semidefinite programming approach to optimal unambiguous discrimination of quantum states
-
Y. C. Eldar (2003), A semidefinite programming approach to optimal unambiguous discrimination of quantum states, IEEE Trans. Inform. Theory 49, pp. 446.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 446
-
-
Eldar, Y.C.1
|