-
1
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
C.H. Bennett and G. Brassard (1984), Quantum cryptography: public-key distribution and coin tossing, In Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. On Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P.W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., Vol. 85, pp. 441-444.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
3
-
-
0000600063
-
Quantum cryptography with coherent states
-
B. Huttner, N. Imoto, N. Gisin, et al (1995), Quantum cryptography with coherent states, Phys. Rev. A, Vol. 51, pp. 1863-1869.
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863-1869
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
-
4
-
-
0343536431
-
Limitations on practical quantum cryptography
-
G. Brassard, N. L̈utkenhaus, T. Mor, et al (2000), Limitations on practical quantum cryptography, Phys. Rev. Lett., Vol. 85, pp. 1330-1333.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330-1333
-
-
Brassard, G.1
-
5
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.Y. Hwang (2003), Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett., Vol. 91, pp. 057901.
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057901
-
-
Hwang, W.Y.1
-
6
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
X.B. Wang (2005), Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett., Vol. 94, pp. 230503.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230503
-
-
Wang, X.B.1
-
7
-
-
27744479495
-
Decoy state quantum key distribution
-
H.K. Lo, X.F. Ma, and K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett.,Vol. 94, pp. 230504.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230504
-
-
Lo, H.K.1
Ma, X.F.2
Chen, K.3
-
8
-
-
33344454530
-
Experimental quantum key distribution with decoy states
-
Y. Zhao, B. Qi, X.F. Ma, et al (2006), Experimental quantum key distribution with decoy states, Phys. Rev. Lett., Vol. 96, pp. 070502.
-
(2006)
Phys. Rev. Lett
, vol.96
, pp. 070502
-
-
Zhao, Y.1
Qi, B.2
Ma, X.F.3
-
9
-
-
33846363964
-
Long-distance decoy-state quantum key distribution in optical fiber
-
D. Rosenberg, J.W. Harrington, P.R. Rice, et al (2007), Long-distance decoy-state quantum key distribution in optical fiber, Phys. Rev. Lett., Vol. 98, pp. 010503.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010503
-
-
Rosenberg, D.1
Harrington, J.W.2
Rice, P.R.3
-
10
-
-
33846383808
-
Experimental demonstration of free-space decoystate quantum key distribution over 144 km
-
S.M. Tobias, Henning W., F. Martin, et al (2007), Experimental demonstration of free-space decoystate quantum key distribution over 144 km, Phys. Rev. Lett., Vol. 98, pp. 010504.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010504
-
-
Tobias, S.M.1
Henning, W.2
Martin, F.3
-
11
-
-
33846356424
-
Experimental long-distance decoy-state quantum key distribution based on polarization encoding
-
C.Z Peng, J. Zhang, D. Yang, et al (2007), Experimental long-distance decoy-state quantum key distribution based on polarization encoding, Phys. Rev. Lett., Vol. 98, pp. 010505.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010505
-
-
Peng, C.Z.1
Zhang, J.2
Yang, D.3
-
12
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
N. Lutkenhaus D. Gottesman, H.K. Lo, et al (2004), Security of quantum key distribution with imperfect devices, Quantum Inf. Comput., Vol. 4, pp. 325.
-
(2004)
Quantum Inf. Comput
, vol.4
, pp. 325
-
-
Gottesman, N.1
Lutkenhaus, D.2
Lo, H.K.3
-
13
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
D. Mayers (1996), Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology-Proceedings of Crypto'96(LNCS), Vol. 1109, pp. 343-357.
-
(1996)
Advances In Cryptology-Proceedings of Crypto'96(LNCS)
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
14
-
-
33846980802
-
Unconditional security of practical quantum key distribution
-
H. Inamori, N. Ltkenhaus, and D. Mayers (2007), Unconditional security of practical quantum key distribution, The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics, Vol. 41, pp. 599-627.
-
(2007)
The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics
, vol.41
, pp. 599-627
-
-
Inamori, H.1
Ltkenhaus, N.2
Mayers, D.3
-
15
-
-
34047263436
-
Small accessible quantum information does not imply security
-
R. König, R. Renner, A. Bariska, et al (2007), Small accessible quantum information does not imply security, Phys. Rev. Lett., Vol. 98, pp. 140502.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 140502
-
-
König, R.1
Renner, R.2
Bariska, A.3
-
16
-
-
34547400660
-
Upper bounds of eavesdropper's performances in finite-length code with the decoy method
-
M. Hayashi (2007), Upper bounds of eavesdropper's performances in finite-length code with the decoy method, Phys. Rev. A, Vol. 76, pp. 012329.
-
(2007)
Phys. Rev. A
, vol.76
, pp. 012329
-
-
Hayashi, M.1
-
17
-
-
71649097222
-
Security analysis of decoy state quantum key distribution incorporating finite statistics
-
arXiv:0707.3541
-
J. Hasegawa, M. Hayashi, T. Hiroshima, et al (2007), Security analysis of decoy state quantum key distribution incorporating finite statistics, arXiv:0707.3541.
-
(2007)
-
-
Hasegawa, J.1
Hayashi, M.2
Hiroshima, T.3
-
18
-
-
34548303396
-
General theory for decoy-state quantum key distribution with an arbitrary number of intensities
-
M. Hayashi (2007), General theory for decoy-state quantum key distribution with an arbitrary number of intensities, New Journal of Physics, Vol. 9, pp. 284.
-
(2007)
New Journal of Physics
, vol.9
, pp. 284
-
-
Hayashi, M.1
-
19
-
-
40749135368
-
Exact minimum and maximum of yield with a finite number of decoy light intensities
-
T. Tsurumaru, A. Soujaeff, and S. Takeuchi (2008), Exact minimum and maximum of yield with a finite number of decoy light intensities, Phys. Rev. A, Vol. 77, pp. 022319.
-
(2008)
Phys. Rev. A
, vol.77
, pp. 022319
-
-
Tsurumaru, T.1
Soujaeff, A.2
Takeuchi, S.3
-
20
-
-
44049101670
-
Security of quantum key distribution
-
R. Renner (2008), Security of quantum key distribution, Int. J. Quantum Inf., Vol. 1, pp. 1-127.
-
(2008)
Int. J. Quantum Inf
, vol.1
, pp. 1-127
-
-
Renner, R.1
-
21
-
-
44249110247
-
Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
-
V. Scarani and R. Renner (2008), Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing, Phys. Rev. Lett., Vol. 100(20), pp. 200501.
-
(2008)
Phys. Rev. Lett
, vol.100
, Issue.20
, pp. 200501
-
-
Scarani, V.1
Renner, R.2
-
22
-
-
58049109215
-
Security bounds for quantum cryptography with finite resources
-
(Lecture Notes In Computer Science)
-
V. Scarani and R. Renner (2008), Security bounds for quantum cryptography with finite resources, In Proc. TQC2008 (Lecture Notes in Computer Science), Vol. 5106, pp. 83-95.
-
(2008)
Proc. TQC2008
, vol.5106
, pp. 83-95
-
-
Scarani, V.1
Renner, R.2
-
23
-
-
66449092549
-
Finite-key analysis for practical implementations of quantum key distribution
-
R.Y.Q. Cai and V. Scarani (2009), Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, Vol. 11, pp. 045024.
-
(2009)
New Journal of Physics
, vol.11
, pp. 045024
-
-
Cai, R.Y.Q.1
Scarani, V.2
-
24
-
-
33750530122
-
Finite key analysis for symmetric attacks in quantum key distribution
-
T. Meyer, H. Kampermann, M. Kleinmann, et al (2006), Finite key analysis for symmetric attacks in quantum key distribution, Phys. Rev. A, Vol. 74, pp. 042340.
-
(2006)
Phys. Rev. A
, vol.74
, pp. 042340
-
-
Meyer, T.1
Kampermann, H.2
Kleinmann, M.3
-
25
-
-
69149107383
-
Security of decoy states qkd with finite resources against collective attacks
-
H.W. Li, Y.B. Zhao, Z.Q. Yin, et al (2009), Security of decoy states qkd with finite resources against collective attacks, Opt. Commun., Vol. 282, pp. 4162 - 4166.
-
(2009)
Opt. Commun
, vol.282
, pp. 4162-4166
-
-
Li, H.W.1
Zhao, Y.B.2
Yin, Z.Q.3
-
26
-
-
34548394977
-
Symmetry of large physical systems implies independence of subsystems
-
R. Renner (2007), Symmetry of large physical systems implies independence of subsystems, Nature Phys., Vol. 3, pp. 645 - 649.
-
(2007)
Nature Phys
, vol.3
, pp. 645-649
-
-
Renner, R.1
-
27
-
-
78649704344
-
Secure key rate of the bb84 protocol using finite sample bits
-
Y. Sano, R. Matsumoto, and T. Uyematsu (2010), Secure key rate of the bb84 protocol using finite sample bits, J. Phys. A: Math. Theor., Vol. 43, pp. 495302.
-
(2010)
J. Phys. A: Math. Theor
, vol.43
, pp. 495302
-
-
Sano, Y.1
Matsumoto, R.2
Uyematsu, T.3
-
28
-
-
44149092178
-
Quantum key distribution with an unknown and untrusted source
-
Y. Zhao, B. Qi, and H.K. Lo (2008), Quantum key distribution with an unknown and untrusted source, Phys. Rev. A, Vol. 77, pp. 052327.
-
(2008)
Phys. Rev. A
, vol.77
, pp. 052327
-
-
Zhao, Y.1
Qi, B.2
Lo, H.K.3
-
29
-
-
66449101012
-
Security proof of quantum key distribution with detection efficiency mismatch
-
B. Qi, H.K. Lo, X.F. Ma, et al (2009), Security proof of quantum key distribution with detection efficiency mismatch, Quantum Inf. Comput, Vol. 9, pp. 131-165.
-
(2009)
Quantum Inf. Comput
, vol.9
, pp. 131-165
-
-
Qi, B.1
Lo, H.K.2
Ma, X.F.3
-
30
-
-
33846365694
-
Effects of detector efficiency mismatch on security of quantum cryptosystems
-
V. Makarov, A. Anisimov, and J. Skaar (2006), Effects of detector efficiency mismatch on security of quantum cryptosystems, Phys. Rev. A, Vol. 74, pp. 022313.
-
(2006)
Phys. Rev. A
, vol.74
, pp. 022313
-
-
Makarov, V.1
Anisimov, A.2
Skaar, J.3
|