메뉴 건너뛰기




Volumn 11, Issue , 2009, Pages

Simple security proof of quantum key distribution based on complementarity

Author keywords

[No Author keywords available]

Indexed keywords

ENTANGLEMENT DISTILLATION; PRIVACY AMPLIFICATION; QUANTUM KEY DISTRIBUTION; QUANTUM KEY DISTRIBUTION PROTOCOLS; SECURITY PROOFS; SINGLE PARAMETER; UNCONDITIONAL SECURITY;

EID: 66449096518     PISSN: 13672630     EISSN: None     Source Type: Journal    
DOI: 10.1088/1367-2630/11/4/045018     Document Type: Article
Times cited : (318)

References (26)
  • 1
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • Shor P W and Preskill J 2000 Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85441
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 2
    • 0001398327 scopus 로고    scopus 로고
    • Good quantum error-correcting codes exist
    • Calderbank A R and Shor P W 1996 Good quantum error-correcting codes exist Phys. Rev. A 541098
    • (1996) Phys. Rev. A , vol.54 , pp. 1098
    • Calderbank, A.R.1    Shor, P.W.2
  • 3
    • 0007244732 scopus 로고    scopus 로고
    • Multiple-particle interference and quantum error correction
    • Steane A M 1996 Multiple-particle interference and quantum error correction Proc. R. Soc. Lond. A 4522551
    • (1996) Proc. R. Soc. Lond. A , vol.452 , pp. 2551
    • Steane, A.M.1
  • 4
    • 66449108133 scopus 로고    scopus 로고
    • Bennett C H and Brassard G 1984 Quantum cryptography: public key distribution and coin tossing Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing (Bangalore, India) (New York: IEEE) pp 175-9
    • Bennett C H and Brassard G 1984 Quantum cryptography: public key distribution and coin tossing Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing (Bangalore, India) (New York: IEEE) pp 175-9
  • 5
    • 0037526588 scopus 로고    scopus 로고
    • Unconditionally secure key distribution based on two nonorthogonal states
    • Tamaki K, Koashi M and Imoto N 2003 Unconditionally secure key distribution based on two nonorthogonal states Phys. Rev. Lett. 90167904
    • (2003) Phys. Rev. Lett , vol.90 , pp. 167904
    • Tamaki, K.1    Koashi, M.2    Imoto, N.3
  • 6
    • 19644377760 scopus 로고    scopus 로고
    • Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse
    • Koashi M 2004 Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse Phys. Rev. Lett. 93120501
    • (2004) Phys. Rev. Lett , vol.93 , pp. 120501
    • Koashi, M.1
  • 7
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • Bennett C H 1992 Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 683121
    • (1992) Phys. Rev. Lett , vol.68 , pp. 3121
    • Bennett, C.H.1
  • 9
    • 3042620599 scopus 로고    scopus 로고
    • Method for decoupling error correction from privacy amplification
    • Lo H K 2003 Method for decoupling error correction from privacy amplification New J. Phys. 5 36
    • (2003) New J. Phys , vol.5 , pp. 36
    • Lo, H.K.1
  • 10
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels Lecture Notes Comput
    • Mayers D 1996 Quantum key distribution and string oblivious transfer in noisy channels Lecture Notes Comput. Sci. 1109343
    • (1996) Sci , vol.1109 , pp. 343
    • Mayers, D.1
  • 11
    • 0037422980 scopus 로고    scopus 로고
    • Secure quantum key distribution with an uncharacterized source
    • Koashi M and Preskill J 2003 Secure quantum key distribution with an uncharacterized source Phys. Rev. Lett. 90057902
    • (2003) Phys. Rev. Lett , vol.90 , pp. 057902
    • Koashi, M.1    Preskill, J.2
  • 12
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • Lo H K and Chau H F 1999 Unconditional security of quantum key distribution over arbitrarily long distances Science 2832050
    • (1999) Science , vol.283 , pp. 2050
    • Lo, H.K.1    Chau, H.F.2
  • 14
    • 33646412037 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution and the uncertainty principle
    • Koashi M 2005 Unconditional security of quantum key distribution and the uncertainty principle J. Phys.: Conf. Ser. 3698
    • (2005) J. Phys.: Conf. Ser , vol.36 , pp. 98
    • Koashi, M.1
  • 15
    • 0001287029 scopus 로고
    • Generalized entropic uncertainty relations
    • Maassen H and Uffink J B M 1988 Generalized entropic uncertainty relations Phys. Rev. Lett. 60 1103
    • (1988) Phys. Rev. Lett , vol.60 , pp. 1103
    • Maassen, H.1    Uffink, J.B.M.2
  • 16
    • 7044249607 scopus 로고    scopus 로고
    • Security of quantum key distribution with imperfect devices Quantum
    • Gottesman D, Lo H K, Lutkenhaus N and Preskill J 2004 Security of quantum key distribution with imperfect devices Quantum Inf. Comput. 5325
    • (2004) Inf. Comput , vol.5 , pp. 325
    • Gottesman, D.1    Lo, H.K.2    Lutkenhaus, N.3    Preskill, J.4
  • 17
    • 0141803639 scopus 로고
    • The 'transition probability' in the state space of a &z.ast;-algebra
    • Uhlmann A 1976 The 'transition probability' in the state space of a &z.ast;-algebra Rep. Math. Phys. 9 273
    • (1976) Rep. Math. Phys , vol.9 , pp. 273
    • Uhlmann, A.1
  • 18
    • 51349163744 scopus 로고
    • Fidelity for mixed quantum states
    • Jozsa R 1994 Fidelity for mixed quantum states J. Mod. Opt. 41 2315
    • (1994) J. Mod. Opt , vol.41 , pp. 2315
    • Jozsa, R.1
  • 21
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • BruB D 1998 Optimal eavesdropping in quantum cryptography with six states Phys. Rev. Lett. 81 3018
    • (1998) Phys. Rev. Lett , vol.81 , pp. 3018
    • BruB, D.1
  • 22
    • 0013207242 scopus 로고    scopus 로고
    • Proof of unconditional security of six-state quantum key distribution scheme Quantum
    • Lo H K 2001 Proof of unconditional security of six-state quantum key distribution scheme Quantum Inf. Comput. 181
    • (2001) Inf. Comput , vol.1 , pp. 81
    • Lo, H.K.1
  • 23
    • 66449129682 scopus 로고    scopus 로고
    • Koashi M 2007 Complementarity, distillable secret key, and distillable entanglement arXiv:0704.3661
    • Koashi M 2007 Complementarity, distillable secret key, and distillable entanglement arXiv:0704.3661
  • 25
    • 27144550522 scopus 로고    scopus 로고
    • Information-theoretic security proof for quantum-key-distribution protocols
    • Renner R, Gisin N and Kraus B 2005 Information-theoretic security proof for quantum-key-distribution protocols Phys. Rev. A 72012332
    • (2005) Phys. Rev. A , vol.72 , pp. 012332
    • Renner, R.1    Gisin, N.2    Kraus, B.3
  • 26
    • 33746924011 scopus 로고    scopus 로고
    • Practical evaluation of security for quantum key distribution
    • Hayashi M 2006 Practical evaluation of security for quantum key distribution Phys. Rev. A 74022307
    • (2006) Phys. Rev. A , vol.74 , pp. 022307
    • Hayashi, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.