-
1
-
-
26944470302
-
Distance measures to compare real and ideal quantum processes
-
G. Alexei, N. Langford, and M. Nielsen. Distance measures to compare real and ideal quantum processes. Physical Review A, 71(6):062310, 2005.
-
(2005)
Physical Review A
, vol.71
, Issue.6
, pp. 062310
-
-
Alexei, G.1
Langford, N.2
Nielsen, M.3
-
3
-
-
84969361843
-
Practical quantum oblivious transfer. in CRYPTO '91
-
Springer-Verlag
-
C. H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska. Practical quantum oblivious transfer. In CRYPTO '91: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages 351-366. Springer-Verlag, 1992.
-
(1992)
Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
4
-
-
71549159308
-
-
quant-ph/0702248
-
A. D. Boozer, A. Boca, R. Miller, T. E. Northup, and H. J. Kimble. Reversible state transfer between light and a single trapped atom, 2007. quant-ph/0702248.
-
(2007)
Reversible State Transfer between Light and A Single Trapped Atom
-
-
Boozer, A.D.1
Boca, A.2
Miller, R.3
Northup, T.E.4
Kimble, H.J.5
-
7
-
-
28644444804
-
Storage and retrieval of single photons between remote quantum memories
-
T. Chanelière, D.N. Matsukevich, S.D. Jenkins, S.-Y. Lan, T.A.B. Kennedy, and A. Kuzmich. Storage and retrieval of single photons between remote quantum memories. Nature, 438:pp. 833-836, 2005.
-
(2005)
Nature
, vol.438
, pp. 833-836
-
-
Chanelière, T.1
Matsukevich, D.N.2
Jenkins, S.D.3
Lan, S.-Y.4
Kennedy, T.A.B.5
Kuzmich, A.6
-
9
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
C. Crépeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions. In Proceedings of 29th IEEE FOCS, pages 42-52, 1988.
-
(1988)
Proceedings of 29th IEEE FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
10
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
C. Crépeau, K. Morozov, and S. Wolf. Efficient unconditional oblivious transfer from almost any noisy channel. In International Conference on Security in Communication Networks (SCN), volume 4 of Lecture Notes in Computer Science, pages 47-59, 2004.
-
(2004)
International Conference on Security in Communication Networks (SCN), Volume 4 of Lecture Notes in Computer Science
, pp. 47-59
-
-
Crépeau, C.1
Morozov, K.2
Wolf, S.3
-
11
-
-
33748633496
-
Cryptography in the Bounded-QuantumStorage Model
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the Bounded-QuantumStorage Model. In Proceedings of 46th IEEE FOCS, pages 449-458, 2005.
-
(2005)
Proceedings of 46th IEEE FOCS
, pp. 449-458
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
12
-
-
38049138207
-
A tight high-order entropie quantum uncertainty relation with applications
-
Springer-Verlag
-
I. B. Damgård, S. Fehr, R. Renner, L. Salvail, and C. Schaffner. A tight high-order entropie quantum uncertainty relation with applications. In Advances in Cryptology-CRYPTO '07, volume 4622 of Lecture Notes in Computer Science, pages 360-378. Springer-Verlag, 2007.
-
(2007)
Advances in Cryptology-CRYPTO '07, Volume 4622 of Lecture Notes in Computer Science
, pp. 360-378
-
-
Damgård, I.B.1
Fehr, S.2
Renner, R.3
Salvail, L.4
Schaffner, C.5
-
13
-
-
38049128687
-
Secure identification and QKD in the boundedquantum-storage model
-
Springer-Verlag
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Secure identification and QKD in the boundedquantum-storage model. In Advances in Cryptology-CRYPTO '07, volume 4622 of Lecture Notes in Computer Science, pages 342-359. Springer-Verlag, 2007.
-
(2007)
Advances in Cryptology-CRYPTO '07, Volume 4622 of Lecture Notes in Computer Science
, pp. 342-359
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
14
-
-
44949109032
-
Cryptography in the bounded-quantumstorage model
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded-quantumstorage model. SIAM Journal on Computing, 37(6):1865-1890, 2008. \
-
(2008)
SIAM Journal on Computing
, vol.37
, Issue.6
, pp. 1865-1890
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
15
-
-
28644441413
-
Electromagnetically induced transparency with tunable single-photon pulses
-
M.D. Eisaman, A. André, F. Massou, M. Fleischauer, A.S. Zibrov, and M. D. Lukin. Electromagnetically induced transparency with tunable single-photon pulses. Nature, 438:pp. 837-841, 2005.
-
(2005)
Nature
, vol.438
, pp. 837-841
-
-
Eisaman, M.D.1
André, A.2
Massou, F.3
Fleischauer, M.4
Zibrov, A.S.5
Lukin, M.D.6
-
16
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. Quantum cryptography. Reviews of Modern Physics, 74:145-195, 2002.
-
(2002)
Reviews of Modern Physics
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
20
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill. Security of quantum key distribution with imperfect devices. Quant. Inf. Comp, 5:325-360, 2004. quant-ph/0212066. (Pubitemid 39427587)
-
(2004)
Quantum Information and Computation
, vol.4
, Issue.5
, pp. 325-360
-
-
Gottesman, D.1
Hoi-Kwonglo, L.O.2
Lutkenhaus, N.3
Preskill, J.4
-
23
-
-
9644289571
-
Experimental demonstration of quantum memory for light
-
B. Julsgaard, J. Sherson, J. I. Cirac, J. Fiurasek, and E. S. Polzik. Experimental demonstration of quantum memory for light. Nature, 432:pp. 482-485, 2004.
-
(2004)
Nature
, vol.432
, pp. 482-485
-
-
Julsgaard, B.1
Sherson, J.2
Cirac, J.I.3
Fiurasek, J.4
Polzik, E.S.5
-
24
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian. Founding cryptography on oblivious transfer. In Proceedings of 20th ACM STOC, pages 20-31, 1988.
-
(1988)
Proceedings of 20th ACM STOC
, pp. 20-31
-
-
Kilian, J.1
-
25
-
-
0035804255
-
A scheme for efficient quantum computation with linear optics
-
DOI 10.1038/35051009
-
E. Knill, R. Laflamme, and G. Milburn. A scheme for efficient quantum computation with linear optics. Nature, 409:46-52, 2001. (Pubitemid 32098618)
-
(2001)
Nature
, vol.409
, Issue.6816
, pp. 46-52
-
-
Knill, E.1
Laflamme, R.2
Milburn, G.J.3
-
27
-
-
0001236013
-
Insecurity of quantum secure computations
-
H-K. Lo. Insecurity of quantum secure computations. Physical Review A, 56:1154, 1997.
-
(1997)
Physical Review A
, vol.56
, pp. 1154
-
-
Lo, H.-K.1
-
28
-
-
0001260566
-
Is quantum bit commitment really possible?
-
H-K. Lo and H. F. Chau. Is quantum bit commitment really possible? Physical Review Letters, 78:3410, 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3410
-
-
Lo, H.-K.1
Chau, H.F.2
-
29
-
-
0010195729
-
Why quantum bit commitment and ideal quantum coin tossing are impossible
-
quant-ph/9605026
-
H-K. Lo and H.F. Chau. Why quantum bit commitment and ideal quantum coin tossing are impossible. In Proceedings of PhysComp96, 1996. quant-ph/9605026.
-
(1996)
Proceedings of PhysComp
, vol.96
-
-
Lo, H.-K.1
Chau, H.F.2
-
31
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
D. Mayers. Unconditionally secure quantum bit commitment is impossible. Physical Review Letters, 78:3414-3417, 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
34
-
-
0036992291
-
Cyclical quantum memory for photonic qubits
-
Dec
-
T. B. Pittman and J. D. Franson. Cyclical quantum memory for photonic qubits. Phys. Rev. A, 66(6):062302, Dec 2002.
-
(2002)
Phys. Rev. A
, vol.66
, Issue.6
, pp. 062302
-
-
Pittman, T.B.1
Franson, J.D.2
-
35
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computer Laboratory, Harvard University, Technical Report TR-81
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical report, Aiken Computer Laboratory, Harvard University, 1981. Technical Report TR-81.
-
(1981)
Technical Report
-
-
Rabin, M.1
-
37
-
-
33846849566
-
Remote preparation of an atomic quantum memory
-
W. Rosenfeld, S. Berner, J. Volz, M. Weber, and H. Weinfurter. Remote preparation of an atomic quantum memory. Physical Review Letters, 98:0505004, 2007.
-
(2007)
Physical Review Letters
, vol.98
, pp. 0505004
-
-
Rosenfeld, W.1
Berner, S.2
Volz, J.3
Weber, M.4
Weinfurter, H.5
-
42
-
-
44949188319
-
Cryptography from noisy storage
-
S. Wehner, C. Schaffner, and B. M. Terhal. Cryptography from noisy storage. Physical Review Letters, 100(22):220502, 2008.
-
(2008)
Physical Review Letters
, vol.100
, Issue.22
, pp. 220502
-
-
Wehner, S.1
Schaffner, C.2
Terhal, B.M.3
-
43
-
-
71549136709
-
Security in the bounded-quantum-storage model
-
S. Wehner and J. Wullschleger. Security in the bounded-quantum-storage model. In ICALP 2008, 2008.
-
(2008)
ICALP 2008
-
-
Wehner, S.1
Wullschleger, J.2
-
44
-
-
0001998264
-
Conjugate coding
-
S. Wiesner. Conjugate coding. Sigact News, 15(1), 1983.
-
(1983)
Sigact News
, vol.15
, Issue.1
-
-
Wiesner, S.1
|