-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE Press, New York, Bangalore, India
-
C. H. Bennett and G. Brassard (1984), Quantum cryptography: Public key distribution and coin tossing in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Press, New York, Bangalore, India, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference On Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0343152990
-
Quantum cryptography based on bell theorem
-
A. K. Ekert (1991), Quantum cryptography based on bell theorem, Phys. Rev. Lett., Vol. 67, pp. 661-663.
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
3
-
-
11944254075
-
Quantum cryptography using any 2 nonorthogonal states
-
C. H. Bennett (1992), Quantum cryptography using any 2 nonorthogonal states, Phys. Rev. Lett., Vol. 68, pp. 3121-3124.
-
(1992)
Phys. Rev. Lett
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
4
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. G. Ribordy, W. Tittel and H. Zbinden (2002), Quantum cryptography, Rev. Mod. Phys., Vol. 74, pp. 145-195.
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.G.2
Tittel, W.3
Zbinden, H.4
-
5
-
-
84955621476
-
Advances in cryptology
-
N. Koblitz, editor, Springer, New York
-
D. Mayers (1996), Advances in cryptology in N. Koblitz, editor, Proceedings of Crypto'96, Vol. 1109, Springer, New York, pp. 343-357.
-
(1996)
Proceedings of Crypto'96
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
6
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers (2001), Unconditional security in quantum cryptography, J. Assoc. Comp. Mach., Vol. 48, pp. 351-406.
-
(2001)
J. Assoc. Comp. Mach
, vol.48
, pp. 351-406
-
-
Mayers, D.1
-
7
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau (1999), Unconditional security of quantum key distribution over arbitrarily long distances, Science, Vol. 283, pp. 2050-2056.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
8
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., Vol. 85, pp. 441-444.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
10
-
-
0037422980
-
Secure quantum key distribution with an uncharacterized source
-
M. Koashi and J. Preskill (2003), Secure quantum key distribution with an uncharacterized source, Phys. Rev. Lett., Vol. 90, 057902.
-
(2003)
Phys. Rev. Lett
, vol.90
, pp. 057902
-
-
Koashi, M.1
Preskill, J.2
-
11
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus and J. Preskill (2004), Security of quantum key distribution with imperfect devices, Quant. Inf. Comp., Vol. 4, pp. 325-360.
-
(2004)
Quant. Inf. Comp
, vol.4
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
12
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszàr and J. Körner (1978), Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, Vol. 24, pp. 339-348.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszàr, I.1
Körner, J.2
-
13
-
-
33846365694
-
Effects of detector efficiency mismatch on security of quantum cryptosystems
-
Ibid. 78, 019905 (2008)
-
V. Makarov, A. Anisimov and J. Skaar (2006), Effects of detector efficiency mismatch on security of quantum cryptosystems, Phys. Rev. A, Vol. 74, 022313; Ibid. 78, 019905 (2008).
-
(2006)
Phys. Rev. A
, vol.74
, pp. 022313
-
-
Makarov, V.1
Anisimov, A.2
Skaar, J.3
-
14
-
-
66449101012
-
Security proof of quantum key distribution with detection efficiency mismatch
-
C.-H. F. Fung, K. Tamaki, B. Qi, H.-K. Lo and X. Ma (2009), Security proof of quantum key distribution with detection efficiency mismatch, Quant. Inf. Comp., Vol. 9, pp. 131-165.
-
(2009)
Quant. Inf. Comp
, vol.9
, pp. 131-165
-
-
Fung C.-H., F.1
Tamaki, K.2
Qi, B.3
Lo, H.-K.4
Ma, X.5
-
15
-
-
44149085575
-
Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
-
V. Makarov and J. Skaar (2008), Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols, Quant. Inf. Comp., Vol. 8, 0622.
-
(2008)
Quant. Inf. Comp
, vol.8
, pp. 0622
-
-
Makarov, V.1
Skaar, J.2
-
16
-
-
33846202211
-
Time-shift attack in practical quantum cryptosystems
-
B. Qi, C. H. F. Fung, H.-K. Lo and X. F. Ma (2007), Time-shift attack in practical quantum cryptosystems, Quant. Inf. Comp., Vol. 7, pp. 73-82.
-
(2007)
Quant. Inf. Comp
, vol.7
, pp. 73-82
-
-
Qi, B.1
Fung, C.H.F.2
Lo, H.-K.3
Ma, X.F.4
-
17
-
-
55049100546
-
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
-
Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen and H.-K. Lo (2008), Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Phys. Rev. A, Vol. 78, 042333.
-
(2008)
Phys. Rev. A
, vol.78
, pp. 042333
-
-
Zhao, Y.1
Fung C.-H., F.2
Qi, B.3
Chen, C.4
Lo, H.-K.5
-
18
-
-
0035841906
-
Experimental quantum key distribution with proven security against realistic attacks
-
P. M. Nielsen, C. Schori, J. L. Sørensen, L. Salvail, I. Damgård and E. Polzik (2001), Experimental quantum key distribution with proven security against realistic attacks, J. Mod. Opt., Vol. 48, pp. 1921-1942.
-
(2001)
J. Mod. Opt
, vol.48
, pp. 1921-1942
-
-
Nielsen, P.M.1
Schori, C.2
Sørensen, J.L.3
Salvail, L.4
Damgård, I.5
Polzik, E.6
-
20
-
-
0034652078
-
Fast and user-friendly quantum key distribution
-
G. Ribordy, J. D. Gautier, N. Gisin, O. Guinnard and H. Zbinden (2000), Fast and user-friendly quantum key distribution, J. Mod. Opt., Vol. 47, pp. 517-531.
-
(2000)
J. Mod. Opt
, vol.47
, pp. 517-531
-
-
Ribordy, G.1
Gautier, J.D.2
Gisin, N.3
Guinnard, O.4
Zbinden, H.5
-
21
-
-
0033907404
-
An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light
-
D. S. Bethune and W. P. Risk (2000), An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light, IEEE J. Quantum Electron., Vol. 36, pp. 340-347.
-
(2000)
IEEE J. Quantum Electron
, vol.36
, pp. 340-347
-
-
Bethune, D.S.1
Risk, W.P.2
-
22
-
-
0035841908
-
Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
-
A. Vakhitov, V. Makarov and D. R. Hjelme (2001), Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt., Vol. 48, pp. 2023-2038.
-
(2001)
J. Mod. Opt
, vol.48
, pp. 2023-2038
-
-
Vakhitov, A.1
Makarov, V.2
Hjelme, D.R.3
-
23
-
-
33646373811
-
Trojan-horse attacks on quantumkey-distribution systems
-
N. Gisin, S. Fasel, B. Kraus, H. Zbinden and G. Ribordy (2006), Trojan-horse attacks on quantumkey-distribution systems, Phys. Rev. A, Vol. 73, 022320.
-
(2006)
Phys. Rev. A
, vol.73
, pp. 022320
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
24
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography.1. information bound and optimal strategy
-
C. A. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu and A. Peres (1997), Optimal eavesdropping in quantum cryptography.1. information bound and optimal strategy, Phys. Rev. A, Vol. 56, pp. 1163-1172.
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.S.4
Peres, A.5
-
25
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer (1993), Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, Vol. 39, pp. 733-742.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
26
-
-
0003560577
-
Optimal quantum measurements for two pure and mixed states
-
V. P. Belavkin, O. Hirota and R. L. Hudson, Editors, Plenum Press, New York
-
L. B. Levitin (1995), Optimal quantum measurements for two pure and mixed states in V. P. Belavkin, O. Hirota and R. L. Hudson, editors, Quantum Communications and Measurement, Plenum Press, New York, pp. 439-448.
-
(1995)
Quantum Communications and Measurement
, pp. 439-448
-
-
Levitin, L.B.1
-
27
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W. Y. Hwang (2003), Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett., Vol. 91, 057901.
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057901
-
-
Hwang, W.Y.1
-
28
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
X.-B. Wang (2005), Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett., Vol. 94, 230503.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
29
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K. Lo, X. F. Ma and K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett., Vol. 94, 230504.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.F.2
Chen, K.3
-
31
-
-
0002787793
-
Experimental realization of any discrete unitary operator
-
M. Reck, A. Zeilinger, H. J. Bernstein and P. Bertani (1994), Experimental realization of any discrete unitary operator, Phys. Rev. Lett., Vol. 73, pp. 58-61.
-
(1994)
Phys. Rev. Lett
, vol.73
, pp. 58-61
-
-
Reck, M.1
Zeilinger, A.2
Bernstein, H.J.3
Bertani, P.4
-
33
-
-
33646412037
-
Simple security proof of quantum key distribution via uncertainty principle
-
M. Koashi (2006), Simple security proof of quantum key distribution via uncertainty principle, J. of Phys. Conference Series, Vol. 36, 98.
-
(2006)
J. of Phys. Conference Series
, vol.36
, pp. 98
-
-
Koashi, M.1
-
34
-
-
0001287029
-
Generalized entropic uncertainty relations
-
H. Maassen and J. B. M. Uffink (1988), Generalized entropic uncertainty relations, Phys. Rev. Lett., Vol. 60, pp. 1103-1106.
-
(1988)
Phys. Rev. Lett
, vol.60
, pp. 1103-1106
-
-
Maassen, H.1
Uffink, J.B.M.2
-
35
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
J. Kilian, editor, LNCS, Springer Verlag, Berlin, also available at
-
R. Renner and R. Koenig (2005), Universally composable privacy amplification against quantum adversaries in J. Kilian, editor, Second Theory of Cryptography Conference, TCC 2005, Vol. 3378 of LNCS, Springer Verlag, Berlin, pp. 407-425, also available at http://arxiv.org/abs/quant-ph/0403133.
-
(2005)
Second Theory of Cryptography Conference, TCC
, vol.3378
, pp. 407-425
-
-
Renner, R.1
Koenig, R.2
-
36
-
-
24144445587
-
The universal composable security of quantum key distribution
-
Lecture Notes in Computer Science, Springer, New York
-
M. Ben-Or, M. Horodecki, D. Leung, D. Mayers and J. Oppenheim (2005), The universal composable security of quantum key distribution in Second Theory of Cryptography Conference, Vol. 3378 of Lecture Notes in Computer Science, Springer, New York, pp. 386-406.
-
(2005)
Second Theory of Cryptography Conference
, vol.3378
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.3
Mayers, D.4
Oppenheim, J.5
-
37
-
-
34547506608
-
Security of quantum key distribution using weak coherent states with nonrandom phases
-
H.-K. Lo and J. Preskill (2007), Security of quantum key distribution using weak coherent states with nonrandom phases, Quant. Inf. Comp., Vol. 7, pp. 431-458.
-
(2007)
Quant. Inf. Comp
, vol.7
, pp. 431-458
-
-
Lo, H.-K.1
Preskill, J.2
|