메뉴 건너뛰기




Volumn 9, Issue 11-12, 2009, Pages 0963-0996

Robust cryptography in the noisy-quantum-storage model

Author keywords

Noisy storage model; Quantum cryptography

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; QUANTUM COMPUTERS;

EID: 71549160846     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (31)

References (45)
  • 1
    • 26944470302 scopus 로고    scopus 로고
    • Distance measures to compare real and ideal quantum processes
    • G. Alexei, N. Langford, and M. Nielsen. Distance measures to compare real and ideal quantum processes. Physical Review A, 71(6):062310, 2005.
    • (2005) Physical Review A , vol.71 , Issue.6 , pp. 062310
    • Alexei, G.1    Langford, N.2    Nielsen, M.3
  • 9
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • C. Crépeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions. In Proceedings of 29th IEEE FOCS, pages 42-52, 1988.
    • (1988) Proceedings of 29th IEEE FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 15
    • 28644441413 scopus 로고    scopus 로고
    • Electromagnetically induced transparency with tunable single-photon pulses
    • M.D. Eisaman, A. André, F. Massou, M. Fleischauer, A.S. Zibrov, and M. D. Lukin. Electromagnetically induced transparency with tunable single-photon pulses. Nature, 438:pp. 837-841, 2005.
    • (2005) Nature , vol.438 , pp. 837-841
    • Eisaman, M.D.1    André, A.2    Massou, F.3    Fleischauer, M.4    Zibrov, A.S.5    Lukin, M.D.6
  • 16
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 23
  • 24
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian. Founding cryptography on oblivious transfer. In Proceedings of 20th ACM STOC, pages 20-31, 1988.
    • (1988) Proceedings of 20th ACM STOC , pp. 20-31
    • Kilian, J.1
  • 25
    • 0035804255 scopus 로고    scopus 로고
    • A scheme for efficient quantum computation with linear optics
    • DOI 10.1038/35051009
    • E. Knill, R. Laflamme, and G. Milburn. A scheme for efficient quantum computation with linear optics. Nature, 409:46-52, 2001. (Pubitemid 32098618)
    • (2001) Nature , vol.409 , Issue.6816 , pp. 46-52
    • Knill, E.1    Laflamme, R.2    Milburn, G.J.3
  • 27
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computations
    • H-K. Lo. Insecurity of quantum secure computations. Physical Review A, 56:1154, 1997.
    • (1997) Physical Review A , vol.56 , pp. 1154
    • Lo, H.-K.1
  • 28
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • H-K. Lo and H. F. Chau. Is quantum bit commitment really possible? Physical Review Letters, 78:3410, 1997.
    • (1997) Physical Review Letters , vol.78 , pp. 3410
    • Lo, H.-K.1    Chau, H.F.2
  • 29
    • 0010195729 scopus 로고    scopus 로고
    • Why quantum bit commitment and ideal quantum coin tossing are impossible
    • quant-ph/9605026
    • H-K. Lo and H.F. Chau. Why quantum bit commitment and ideal quantum coin tossing are impossible. In Proceedings of PhysComp96, 1996. quant-ph/9605026.
    • (1996) Proceedings of PhysComp , vol.96
    • Lo, H.-K.1    Chau, H.F.2
  • 31
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • D. Mayers. Unconditionally secure quantum bit commitment is impossible. Physical Review Letters, 78:3414-3417, 1997.
    • (1997) Physical Review Letters , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 34
    • 0036992291 scopus 로고    scopus 로고
    • Cyclical quantum memory for photonic qubits
    • Dec
    • T. B. Pittman and J. D. Franson. Cyclical quantum memory for photonic qubits. Phys. Rev. A, 66(6):062302, Dec 2002.
    • (2002) Phys. Rev. A , vol.66 , Issue.6 , pp. 062302
    • Pittman, T.B.1    Franson, J.D.2
  • 35
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computer Laboratory, Harvard University, Technical Report TR-81
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical report, Aiken Computer Laboratory, Harvard University, 1981. Technical Report TR-81.
    • (1981) Technical Report
    • Rabin, M.1
  • 43
    • 71549136709 scopus 로고    scopus 로고
    • Security in the bounded-quantum-storage model
    • S. Wehner and J. Wullschleger. Security in the bounded-quantum-storage model. In ICALP 2008, 2008.
    • (2008) ICALP 2008
    • Wehner, S.1    Wullschleger, J.2
  • 44
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner. Conjugate coding. Sigact News, 15(1), 1983.
    • (1983) Sigact News , vol.15 , Issue.1
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.