메뉴 건너뛰기




Volumn 79, Issue C, 2004, Pages 295-314

Course 7 Quantum cryptography with and without entanglement

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77956690017     PISSN: 09248099     EISSN: None     Source Type: Book Series    
DOI: 10.1016/S0924-8099(03)80031-8     Document Type: Chapter
Times cited : (1)

References (54)
  • 2
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • Maurer U.M. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39 (1993) 733-742
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 4
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionnally secure key agreement and intrinsic information
    • Maurer U.M., and Wolf S. Unconditionnally secure key agreement and intrinsic information. IEEE Transactions on Information Theory 45 (1999) 499-514
    • (1999) IEEE Transactions on Information Theory , vol.45 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 5
    • 0000324562 scopus 로고    scopus 로고
    • Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols
    • Gisin N., and Wolf S. Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols. Phys. Rev. Lett. 83 (1999) 4200-4203
    • (1999) Phys. Rev. Lett. , vol.83 , pp. 4200-4203
    • Gisin, N.1    Wolf, S.2
  • 6
    • 84974621399 scopus 로고    scopus 로고
    • Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
    • Advances in cryptology-Proceedings of Crypto 2000
    • Gisin N., and Wolf S. Linking Classical and Quantum Key Agreement: Is There "Bound Information"?. Advances in cryptology-Proceedings of Crypto 2000. Lecture Notes in Computer Science Vol. 1880 (2000) 482-500
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 482-500
    • Gisin, N.1    Wolf, S.2
  • 7
    • 0344899192 scopus 로고    scopus 로고
    • Equivalence between two-qubit entanglement and secure key distribution
    • also quant-ph/0303053
    • also quant-ph/0303053. Acin T., Gisin N., and Massanes L. Equivalence between two-qubit entanglement and secure key distribution. Phys. Rev. Lett. 91 (2003) 167901
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 167901
    • Acin, T.1    Gisin, N.2    Massanes, L.3
  • 9
    • 33746708860 scopus 로고
    • A single quanta cannot be cloned
    • Wooters W.K., and Zurek W.H. A single quanta cannot be cloned. Nature 299 (1982) 802-803
    • (1982) Nature , vol.299 , pp. 802-803
    • Wooters, W.K.1    Zurek, W.H.2
  • 10
    • 0001339556 scopus 로고
    • Photons cannot always be replicated
    • Milonni P.W., and Hardies M.L. Photons cannot always be replicated. Phys. Lett. A 92 (1982) 321-322
    • (1982) Phys. Lett. A , vol.92 , pp. 321-322
    • Milonni, P.W.1    Hardies, M.L.2
  • 11
    • 33750978344 scopus 로고
    • Communication by EPR devices
    • Dieks D. Communication by EPR devices. Phys. Lett. A 92 (1982) 271-272
    • (1982) Phys. Lett. A , vol.92 , pp. 271-272
    • Dieks, D.1
  • 13
    • 0026867928 scopus 로고
    • Polarization mode dispersion: Time versus frequency domain
    • Gisin N., and Pellaux J.P. Polarization mode dispersion: Time versus frequency domain. Optics Commun. 89 (1992) 316-323
    • (1992) Optics Commun. , vol.89 , pp. 316-323
    • Gisin, N.1    Pellaux, J.P.2
  • 15
    • 0001395953 scopus 로고
    • Observation of Berry's topological phase by use of an optical fiber
    • Tomita A., and Chiao R.Y. Observation of Berry's topological phase by use of an optical fiber. Phys. Rev. Lett. 57 (1986) 937-940
    • (1986) Phys. Rev. Lett. , vol.57 , pp. 937-940
    • Tomita, A.1    Chiao, R.Y.2
  • 16
    • 0032621435 scopus 로고    scopus 로고
    • Pulsed energy-time entangled twin-photon source for quantum communication
    • Brendel J., Gisin N., Tittel W., and Zbinden H. Pulsed energy-time entangled twin-photon source for quantum communication. Phys. Rev. Lett. 82 12 (1999) 2594-2597
    • (1999) Phys. Rev. Lett. , vol.82 , Issue.12 , pp. 2594-2597
    • Brendel, J.1    Gisin, N.2    Tittel, W.3    Zbinden, H.4
  • 17
    • 0002437815 scopus 로고    scopus 로고
    • Photonic Entanglement for Fundamental Tests and Quantum Communication
    • No. 2, Rinton Press
    • No. 2. Tittel W., and Weihs G. Photonic Entanglement for Fundamental Tests and Quantum Communication. QIC Vol. 1 (2001), Rinton Press 3-56
    • (2001) QIC , vol.1 , pp. 3-56
    • Tittel, W.1    Weihs, G.2
  • 18
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • Ekert A.K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67 (1991) 661-663
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 20
    • 0000057408 scopus 로고    scopus 로고
    • Quantum Cryptography Using Entangled Photons in Energy-Time Bell States
    • Tittel W., Brendel J., Zbinden H., and Gisin N. Quantum Cryptography Using Entangled Photons in Energy-Time Bell States. Phys. Rev. Lett. 84 (2000) 4737-4740
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 4737-4740
    • Tittel, W.1    Brendel, J.2    Zbinden, H.3    Gisin, N.4
  • 21
    • 3442883654 scopus 로고
    • Bell Inequality for Position and Time
    • Franson J.D. Bell Inequality for Position and Time. Phys. Rev. Lett. 62 (1989) 2205-2208
    • (1989) Phys. Rev. Lett. , vol.62 , pp. 2205-2208
    • Franson, J.D.1
  • 22
    • 4243256974 scopus 로고    scopus 로고
    • Violation of Bell inequalities by photons more than 10 km apart
    • Tittel W., Brendel J., Zbinden H., and Gisin N. Violation of Bell inequalities by photons more than 10 km apart. Phys. Rev. Lett. 81 (1998) 3563-3566
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3563-3566
    • Tittel, W.1    Brendel, J.2    Zbinden, H.3    Gisin, N.4
  • 25
    • 77956697283 scopus 로고    scopus 로고
    • http://www.MagiQtech.com
  • 26
    • 0027580767 scopus 로고
    • Single photon interference in a 10 km long optical fiber interferometer
    • Townsend P., Rarity J.G., and Tapster P.R. Single photon interference in a 10 km long optical fiber interferometer. Electron. Lett. 29 (1993) 634-639
    • (1993) Electron. Lett. , vol.29 , pp. 634-639
    • Townsend, P.1    Rarity, J.G.2    Tapster, P.R.3
  • 27
    • 0034652057 scopus 로고    scopus 로고
    • Quantum key distribution over a 48km optical fibre network
    • Hughes R., Morgan G., and Peterson C. Quantum key distribution over a 48km optical fibre network. J. Modern Opt. 47 (2000) 533-547
    • (2000) J. Modern Opt. , vol.47 , pp. 533-547
    • Hughes, R.1    Morgan, G.2    Peterson, C.3
  • 28
    • 0024716272 scopus 로고
    • A universal compensator for polarization changes induced by birefringence on a retracing beam
    • Martinelli M. A universal compensator for polarization changes induced by birefringence on a retracing beam. Opt. Commun. 72 (1989) 341-344
    • (1989) Opt. Commun. , vol.72 , pp. 341-344
    • Martinelli, M.1
  • 29
    • 84862947674 scopus 로고
    • Time reversal for the polarization state in optical systems
    • Martinelli M. Time reversal for the polarization state in optical systems. J. Modern Opt. 39 (1992) 451-455
    • (1992) J. Modern Opt. , vol.39 , pp. 451-455
    • Martinelli, M.1
  • 30
    • 77956690100 scopus 로고    scopus 로고
    • http://www.jdsu.com
  • 33
    • 0033907404 scopus 로고    scopus 로고
    • An Autocompensating Fiber-Optic Quantum Cryptography System Based on Polarization Splitting of Light
    • Bethune D., and Risk W. An Autocompensating Fiber-Optic Quantum Cryptography System Based on Polarization Splitting of Light. IEEE J. Quantum Electron. 36 (2000) 340-347
    • (2000) IEEE J. Quantum Electron. , vol.36 , pp. 340-347
    • Bethune, D.1    Risk, W.2
  • 35
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 Quantum key distribution protocol
    • Shor P.W., and Preskill J. Simple proof of security of the BB84 Quantum key distribution protocol. Phys. Rev. Lett. 85 (2000) 441-444
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 36
    • 0009956931 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • (to be published); also quant-ph/9802025
    • (to be published); also quant-ph/9802025. Mayers D. Unconditional security in quantum cryptography. Journal for the Association of Computing Machinery (1998)
    • (1998) Journal for the Association of Computing Machinery
    • Mayers, D.1
  • 37
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrary long distances
    • also quant-ph/9803006
    • also quant-ph/9803006. Lo H.-K., and Chau H.F. Unconditional security of quantum key distribution over arbitrary long distances. Science 283 (1999) 2050-2056
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 39
    • 0001817392 scopus 로고    scopus 로고
    • A local hidden variable model of quantum correlation exploiting the detection loophole
    • Gisin B., and Gisin N. A local hidden variable model of quantum correlation exploiting the detection loophole. Phys. Lett. A 260 (1999) 323-327
    • (1999) Phys. Lett. A , vol.260 , pp. 323-327
    • Gisin, B.1    Gisin, N.2
  • 41
    • 0347111146 scopus 로고    scopus 로고
    • Security against individual attacks for realistic quantum key distribution
    • Lütkenhaus N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61 (2000) 052304
    • (2000) Phys. Rev. A , vol.61 , pp. 052304
    • Lütkenhaus, N.1
  • 42
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography
    • Bechmann-Pasquinucci H., and Gisin N. Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography. Phys. Rev. A 59 (1999) 4238-4248
    • (1999) Phys. Rev. A , vol.59 , pp. 4238-4248
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 43
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • Bruss D. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81 (1998) 3018-3021
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018-3021
    • Bruss, D.1
  • 44
    • 0037171183 scopus 로고    scopus 로고
    • Security of quantum key distribution using d-level systems
    • Cerf N., Bourennane M., Karlsson A., and Gisin N. Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88 (2002) 127902/1-127902/4
    • (2002) Phys. Rev. Lett. , vol.88
    • Cerf, N.1    Bourennane, M.2    Karlsson, A.3    Gisin, N.4
  • 45
    • 0037171194 scopus 로고    scopus 로고
    • Optimal eavesdropping in cryptography with three-dimensional quantum states
    • Bruss D., and Macchiavello C. Optimal eavesdropping in cryptography with three-dimensional quantum states. Phys. Rev. Lett. 88 (2002) 127901
    • (2002) Phys. Rev. Lett. , vol.88 , pp. 127901
    • Bruss, D.1    Macchiavello, C.2
  • 48
    • 0013237387 scopus 로고    scopus 로고
    • Unconditional Security of Practical Quantum Key Distribution
    • quant-ph/0107017
    • H. Inamori, N. Lütkenhaus and D. Mayers, "Unconditional Security of Practical Quantum Key Distribution", quant-ph/0107017.
    • Inamori, H.1    Lütkenhaus, N.2    Mayers, D.3
  • 53
    • 77956669660 scopus 로고    scopus 로고
    • Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks, quant-ph/0302037, accepted in Phys
    • A. Acin, V. Scarani and N. Gisin, "Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks", quant-ph/0302037, accepted in Phys. Rev. A.
    • Rev. A
    • Acin, A.1    Scarani, V.2    Gisin, N.3
  • 54
    • 77956708402 scopus 로고    scopus 로고
    • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations, quant-ph/0211131, submitted to Phys
    • V. Scarani, A. Acin, G. Ribordy and N. Gisin, "Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations", quant-ph/0211131, submitted to Phys. Rev. Lett.
    • Rev. Lett
    • Scarani, V.1    Acin, A.2    Ribordy, G.3    Gisin, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.