메뉴 건너뛰기




Volumn 6110 LNCS, Issue , 2010, Pages 216-234

Efficient device-independent quantum key distribution

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION FLOWS; NONLOCAL; PHYSICAL PHENOMENA; QUANTUM KEY DISTRIBUTION; QUANTUM PHYSICS;

EID: 77954653828     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13190-5_11     Document Type: Conference Paper
Times cited : (65)

References (45)
  • 3
    • 0017930809 scopus 로고
    • METHOD for OBTAINING DIGITAL SIGNATURES and PUBLIC-KEY CRYPTOSYSTEMS
    • DOI 10.1145/359340.359342
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 4
    • 85043762670 scopus 로고
    • A provably-secure strongly-randomized cipher
    • Damgård, I.B. (ed.) EUROCRYPT 1990. Springer, Heidelberg
    • Maurer, U.: A provably-secure strongly-randomized cipher. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 361-373. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.473 , pp. 361-373
    • Maurer, U.1
  • 5
    • 45249112311 scopus 로고    scopus 로고
    • The bare bounded-storage model: The tight bound on the storage requirement for key agreement
    • Dziembowski, S., Maurer, U.: The bare bounded-storage model: The tight bound on the storage requirement for key agreement. IEEE Trans. on Information Theory 54(6), 2790-2792 (2008)
    • (2008) IEEE Trans. on Information Theory , vol.54 , Issue.6 , pp. 2790-2792
    • Dziembowski, S.1    Maurer, U.2
  • 6
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A.D.: The wire-tap channel. Bell System Technical J 54(8), 1355-1387 (1975)
    • (1975) Bell System Technical J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 7
  • 8
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. of Cryptology 5(1), 53-66 (1992)
    • (1992) J. of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 10
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • Ekert, A.K.: Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67(6), 661-663 (1991)
    • (1991) Phys. Rev. Lett. , vol.67 , Issue.6 , pp. 661-663
    • Ekert, A.K.1
  • 11
    • 33646373811 scopus 로고    scopus 로고
    • Trojan-horse attacks on quantum-key-distribution systems
    • Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)
    • (2006) Phys. Rev. A , vol.73 , Issue.2 , pp. 022320
    • Gisin, N.1    Fasel, S.2    Kraus, B.3    Zbinden, H.4    Ribordy, G.5
  • 12
    • 33947205243 scopus 로고    scopus 로고
    • Phase-remapping attack in practical quantum-key-distribution systems
    • Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)
    • (2007) Phys. Rev. A , vol.75 , Issue.3 , pp. 032314
    • Fung, C.H.F.1    Qi, B.2    Tamaki, K.3    Lo, H.K.4
  • 14
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
    • Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)
    • (2008) Phys. Rev. A , vol.78 , Issue.4 , pp. 042333
    • Zhao, Y.1    Fung, C.H.F.2    Qi, B.3    Chen, C.4    Lo, H.K.5
  • 15
    • 67650035011 scopus 로고    scopus 로고
    • Controlling passively quenched single photon detectors by bright light
    • Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. of Physics 11(6), 065003 (2009)
    • (2009) New J. of Physics , vol.11 , Issue.6 , pp. 065003
    • Makarov, V.1
  • 17
    • 0032306873 scopus 로고    scopus 로고
    • Quantum cryptography with imperfect apparatus
    • Mayers, D.C., Yao, A.: Quantum cryptography with imperfect apparatus. In: FOCS 1998, pp. 503-509 (1998)
    • (1998) FOCS 1998 , pp. 503-509
    • Mayers, D.C.1    Yao, A.2
  • 18
    • 27144477301 scopus 로고    scopus 로고
    • No signalling and quantum key distribution
    • Barrett, J., Hardy, L., Kent, A.: No signalling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005)
    • (2005) Phys. Rev. Lett. , vol.95 , pp. 010503
    • Barrett, J.1    Hardy, L.2    Kent, A.3
  • 19
    • 33746830453 scopus 로고    scopus 로고
    • Efficient quantum key distribution secure against no-signalling eavesdroppers
    • DOI 10.1088/1367-2630/8/8/126, PII S1367263006261457
    • Acín, A., Massar, S., Pironio, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. of Phys. 8(8), 126 (2006) (Pubitemid 44180726)
    • (2006) New Journal of Physics , vol.8 , pp. 126
    • Aci, A.1    Massar, S.2    Pironio, S.3
  • 21
    • 33748942504 scopus 로고    scopus 로고
    • From Bell's theorem to secure quantum key distribution
    • Acín, A., Gisin, N., Masanes, L.: From Bell's theorem to secure quantum key distribution. Phys. Rev. Lett. 97, 120405 (2006)
    • (2006) Phys. Rev. Lett. , vol.97 , pp. 120405
    • Acín, A.1    Gisin, N.2    Masanes, L.3
  • 22
    • 34547380185 scopus 로고    scopus 로고
    • Device-independent security of quantum cryptography against collective attacks
    • Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)
    • (2007) Phys. Rev. Lett. , vol.98 , pp. 230501
    • Acín, A.1    Brunner, N.2    Gisin, N.3    Massar, S.4    Pironio, S.5    Scarani, V.6
  • 23
    • 72149091696 scopus 로고    scopus 로고
    • Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
    • McKague, M.: Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. of Phys. 11(10), 103037 (2009)
    • (2009) New J. of Phys. , vol.11 , Issue.10 , pp. 103037
    • McKague, M.1
  • 25
    • 0000486090 scopus 로고
    • On the Einstein-Podolsky-Rosen paradox
    • Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964)
    • (1964) Physics , vol.1 , pp. 195-200
    • Bell, J.S.1
  • 26
    • 33947385649 scopus 로고
    • Can quantum-mechanical description of physical reality be considered complete?
    • Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777-780 (1935)
    • (1935) Phys. Rev. , vol.47 , pp. 777-780
    • Einstein, A.1    Podolsky, B.2    Rosen, N.3
  • 27
    • 36049056258 scopus 로고
    • Proposed experiment to test local hidden-variable theories
    • Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880-884 (1969)
    • (1969) Phys. Rev. Lett. , vol.23 , Issue.15 , pp. 880-884
    • Clauser, J.F.1    Horne, M.A.2    Shimony, A.3    Holt, R.A.4
  • 28
    • 21344488159 scopus 로고
    • Quantum nonlocality as an axiom
    • Popescu, S., Rohrlich, D.: Quantum nonlocality as an axiom. Found. Phys. 24(3), 379-385 (1994)
    • (1994) Found. Phys. , vol.24 , Issue.3 , pp. 379-385
    • Popescu, S.1    Rohrlich, D.2
  • 29
    • 34250250611 scopus 로고
    • Quantum generalizations of Bell's inequality
    • Cirel'son, B.S.: Quantum generalizations of Bell's inequality. Lett. in Math. Phys. 4(2), 93-100 (1980)
    • (1980) Lett. in Math. Phys. , vol.4 , Issue.2 , pp. 93-100
    • Cirel'Son, B.S.1
  • 31
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: STOC 1989, pp. 12-24 (1989)
    • (1989) STOC 1989 , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 34
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Renner, R., Koenig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407-425. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 407-425
    • Renner, R.1    Koenig, R.2
  • 36
    • 65549151429 scopus 로고    scopus 로고
    • Universally composable privacy amplification from causality constraints
    • Masanes, L.: Universally composable privacy amplification from causality constraints. Phys. Rev. Lett. 102(14), 140501 (2009)
    • (2009) Phys. Rev. Lett. , vol.102 , Issue.14 , pp. 140501
    • Masanes, L.1
  • 38
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.1
  • 41
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS 2001, p. 136 (2001)
    • (2001) FOCS 2001 , pp. 136
    • Canetti, R.1
  • 43
    • 84963650728 scopus 로고
    • Universal classes of hash functions
    • extended abstract
    • Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: STOC 1977, pp. 106-112 (1977)
    • (1977) STOC 1977 , pp. 106-112
    • Carter, J.L.1    Wegman, M.N.2
  • 44
    • 85027496257 scopus 로고
    • Secret key reconciliation by public discussion
    • Advances in Cryptology - EUROCRYPT '93
    • Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410-423. Springer, Heidelberg (1994) (Pubitemid 24767313)
    • (1994) LECTURE NOTES in COMPUTER SCIENCE , Issue.765 , pp. 410
    • Brassard, G.1    Salvail, L.2
  • 45
    • 29744466493 scopus 로고    scopus 로고
    • A de Finetti representation for finite symmetric quantum states
    • 122108
    • König, R., Renner, R.: A de Finetti representation for finite symmetric quantum states. J. Math. Phys. 46(122108) (2005)
    • (2005) J. Math. Phys. , vol.46
    • König, R.1    Renner, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.