-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangaluru, India
-
C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput., Syst., Signal Process., Bangaluru, India, 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Comput., Syst., Signal Process.
, pp. 175-179
-
-
Bennet, C.H.1
Brassard, G.2
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
Apr.
-
C. H. Bennet, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol.17, no.2, pp. 210-229, Apr. 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennet, C.H.1
Brassard, G.2
Robert, J.-M.3
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
Sep.
-
C. H. Bennet, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptol., vol.5, pp. 3-28, Sep. 1991.
-
(1991)
J. Cryptol.
, vol.5
, pp. 23-28
-
-
Bennet, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
5
-
-
0036013605
-
Quantum cryptography
-
Jan.
-
N.Gisin,G.Ribordy,W. Tittle, andH. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol.74, pp. 145-195, Jan. 2002.
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittle, W.3
Zbinden, H.4
-
6
-
-
0011769922
-
Quantum key distribution over 67 km with a plug&play system
-
Jul.
-
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New J. Phys., vol.4, pp. 41.1-41.8, Jul. 2002.
-
(2002)
New J. Phys.
, vol.4
, pp. 411-418
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
7
-
-
2942611260
-
Quantum key distribution over 122 km of standard telecom fiber
-
May
-
C. Gobby, Z. L. Yuan, and A. J. Shields, "Quantum key distribution over 122 km of standard telecom fiber," Appl. Phys. Lett., vol.84, pp. 3762- 3764, May 2004.
-
(2004)
Appl. Phys. Lett.
, vol.84
, pp. 3762-3764
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
8
-
-
33846363964
-
Long-distance decoy-state quantum key distribution in optical fiber
-
Jan.
-
D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. E. Lita, S. W. Nam, and J. E. Nordholt, "Long-distance decoy-state quantum key distribution in optical fiber," Phys. Rev. Lett., vol.98, pp. 010503-1-010503-4, Jan. 2007.
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 0105031-0105034
-
-
Rosenberg, D.1
Harrington, J.W.2
Rice, P.R.3
Hiskett, P.A.4
Peterson, C.G.5
Hughes, R.J.6
Lita, A.E.7
Nam, S.W.8
Nordholt, J.E.9
-
9
-
-
47849106573
-
Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization
-
Jul.
-
A. Tanaka, M. Fujiwara, S. W. Nam, Y. Nambu, S. Takahashi, W. Maeda, K. Yoshino, S. Miki, B. Baek, Z. Wang, A. Tajima, M. Sasaki, and A. Tomita, "Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization," Opt. Exp., vol.16, pp. 11354-11360, Jul. 2008.
-
(2008)
Opt. Exp.
, vol.16
, pp. 11354-11360
-
-
Tanaka, A.1
Fujiwara, M.2
Nam, S.W.3
Nambu, Y.4
Takahashi, S.5
Maeda, W.6
Yoshino, K.7
Miki, S.8
Baek, B.9
Wang, Z.10
Tajima, A.11
Sasaki, M.12
Tomita, A.13
-
10
-
-
56149113102
-
Gigahertz decoy quantum key distribution with 1Mbit/s secure key rate
-
Nov.
-
A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, "Gigahertz decoy quantum key distribution with 1Mbit/s secure key rate," Opt. Exp., vol.16, pp. 18790-18797, Nov. 2008.
-
(2008)
Opt. Exp.
, vol.16
, pp. 18790-18797
-
-
Dixon, A.R.1
Yuan, Z.L.2
Dynes, J.F.3
Sharpe, A.W.4
Shields, A.J.5
-
11
-
-
0000600063
-
Quantum cryptography with coherent states
-
Mar.
-
B. Huttner, N. Imoto, N. Gisin, and T. Mor, "Quantum cryptography with coherent states," Phys. Rev. A, vol.51, pp. 1863-1870, Mar. 1995.
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863-1870
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
12
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
Aug.
-
W.-Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett., vol.91, no.5, pp. 057901-1- 057901-4, Aug. 2003.
-
(2003)
Phys. Rev. Lett.
, vol.91
, Issue.5
, pp. 0579011-0579014
-
-
Hwang, W.-Y.1
-
13
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
Jun.
-
X.-B. Wang, "Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett., vol.94, pp. 230503-1-230503- 4, Jun. 2005.
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 2305031-2305034
-
-
Wang, X.-B.1
-
14
-
-
27744479495
-
Decoy state quantum key distribution
-
Jun.
-
H.-K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett., vol.94, pp. 230504-1-230504-4, Jun. 2005.
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 2305041-2305044
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
15
-
-
27844566291
-
Faked states attack on quantum cryptosystems
-
Mar.
-
V. Makarov and D. R. Hjelme, "Faked states attack on quantum cryptosystems," J. Mod. Opt., vol.52, no.5, pp. 691-705, Mar. 2005.
-
(2005)
J. Mod. Opt.
, vol.52
, Issue.5
, pp. 691-705
-
-
Makarov, V.1
Hjelme, D.R.2
-
16
-
-
33846202211
-
Time-shift attack in practical quantum cryptosystems
-
(quant-ph/0512080)
-
B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, "Time-shift attack in practical quantum cryptosystems," Quantum Inf. Comput., vol.7, no.1, pp. 73-82, 2007 (quant-ph/0512080).
-
(2007)
Quantum Inf. Comput.
, vol.7
, Issue.1
, pp. 73-82
-
-
Qi, B.1
Fung, C.-H.F.2
Lo, H.-K.3
Ma, X.4
-
17
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
Jul.
-
P.W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol.85, no.2, pp. 441-444, Jul. 2000.
-
(2000)
Phys. Rev. Lett.
, vol.85
, Issue.2
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
19
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
Sep.
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," Quantum Inf. Comput., vol.4, no.5, pp. 325-360, Sep. 2004.
-
(2004)
Quantum Inf. Comput.
, vol.4
, Issue.5
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
20
-
-
49249121205
-
Entangled quantum-keydistribution randomness
-
Aug.
-
I. J. Owens, R. J. Hughes, and J. E. Nordholt, "Entangled quantum-keydistribution randomness," Phys. Rev. A, vol.78, pp. 022307-1-022307-5, Aug. 2008.
-
(2008)
Phys. Rev. A
, vol.78
, pp. 0223071-0223075
-
-
Owens, I.J.1
Hughes, R.J.2
Nordholt, J.E.3
-
21
-
-
66249106052
-
Practical long-distance quantum key distribution system using decoy levels
-
Apr.
-
D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R. Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam, B. Baek, R. H. Hadfield, R. J. Hughes, and J. E. Nordholt, "Practical long-distance quantum key distribution system using decoy levels," New J. Phys., vol.11, pp. 045009-1-045009- 10, Apr. 2009.
-
(2009)
New J. Phys.
, vol.11
, pp. 04500901-04500910
-
-
Rosenberg, D.1
Peterson, C.G.2
Harrington, J.W.3
Rice, P.R.4
Dallmann, N.5
Tyagi, K.T.6
McCabe, K.P.7
Nam, S.8
Baek, B.9
Hadfield, R.H.10
Hughes, R.J.11
Nordholt, J.E.12
-
22
-
-
72149112796
-
-
NIST FIPS publication 140-142 [Online]. Available
-
NIST FIPS publication 140-142 [Online]. Available: http://csrc.nist.gov/ publications.
-
-
-
-
23
-
-
72149096548
-
-
NIST special publication 800-822 rev1 [Online]. Available
-
NIST special publication 800-822 rev1 [Online]. Available: http://csrc.nist. gov/publications.
-
-
-
-
24
-
-
34648846049
-
Practical quantum cryptosystem for metro area applications
-
Jul./Aug.
-
A. Tajima, A. Tanaka,W. Maeda, S. Takahashi, and A. Tomita, "Practical quantum cryptosystem for metro area applications," IEEE J. Sel. Topics Quantum Electron., vol.13, no.4, pp. 1031-1038, Jul./Aug. 2007.
-
(2007)
IEEE J. Sel. Topics Quantum Electron.
, vol.13
, Issue.4
, pp. 1031-1038
-
-
Tajima, A.1
Tanaka, A.2
Maeda, W.3
Takahashi, S.4
Tomita, A.5
-
25
-
-
33751342497
-
Fortnight quantum key generation field trial using QBER monitoring
-
A. Tanaka, W. Maeda, A. Tajima, and S. Takahashi, "Fortnight quantum key generation field trial using QBER monitoring," in Proc. 18th Annu. Meeting IEEE Lasers Electro-Opt. Soc., 2005, pp. 557-558.
-
(2005)
Proc. 18th Annu. Meeting IEEE Lasers Electro-Opt. Soc.
, pp. 557-558
-
-
Tanaka, A.1
Maeda, W.2
Tajima, A.3
Takahashi, S.4
-
27
-
-
72149106515
-
-
Synchronous Optical Network (SONET)
-
Synchronous Optical Network (SONET), ANSI Standard T1.105, 1995.
-
(1995)
ANSI Standard T1.105
-
-
-
28
-
-
72149089340
-
-
Synchronous Digital Hierarchy (SDH)
-
Synchronous Digital Hierarchy (SDH), ITU Standard ITU-T G.707, 1996.
-
(1996)
ITU Standard ITU-T G.707
-
-
-
29
-
-
72149112511
-
-
Standard for Information Technology
-
Standard for Information Technology, IEEE Standard 802.3, 1999.
-
(1999)
IEEE Standard 802.3
-
-
-
30
-
-
84991939136
-
LFSR-based hashing and authentication
-
Aug.
-
H. Krawczyk, "LFSR-based hashing and authentication," in Proc. Adv. Cryptol. (CRYPTO), Aug. 1994, pp. 129-139.
-
(1994)
Proc. Adv. Cryptol. (CRYPTO)
, pp. 129-139
-
-
Krawczyk, H.1
-
32
-
-
34648836618
-
-
quant-ph/0705.3081, May
-
J. Hasegawa, M. Hayashi, T. Hiroshima, A. Tanaka, and A. Tomita, "Experimental decoy state quantum key distribution with unconditional security incorporating finite statistics," quant-ph/0705.3081, May 2007.
-
(2007)
Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics
-
-
Hasegawa, J.1
Hayashi, M.2
Hiroshima, T.3
Tanaka, A.4
Tomita, A.5
|