메뉴 건너뛰기




Volumn 496, Issue 7446, 2013, Pages 456-460

Classical command of quantum systems

Author keywords

[No Author keywords available]

Indexed keywords

EXPERIMENTAL STUDY; MECHANICAL CONTROL; QUANTUM MECHANICS;

EID: 84876809038     PISSN: 00280836     EISSN: 14764687     Source Type: Journal    
DOI: 10.1038/nature12035     Document Type: Article
Times cited : (437)

References (40)
  • 4
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • Lo, H.-K. & Chau, H. F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050-2056 (1999).
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 5
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441-444 (2000).
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 6
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems
    • Zhao, Y., Fung, C.-H. F., Qi, B., Chen, C. & Lo, H.-K. Quantum hacking: experimental demonstration of time-shift attack against practical quantum key distribution systems. Phys. Rev. A 78, 042333 (2008).
    • (2008) Phys. Rev. A , vol.78 , pp. 042333
    • Zhao, Y.1    Fung, C.-H.F.2    Qi, B.3    Chen, C.4    Lo, H.-K.5
  • 7
    • 77957566438 scopus 로고    scopus 로고
    • Hacking commercial quantumcryptography systemsby tailored bright illumination
    • Lydersen, L. et al. Hacking commercial quantumcryptography systemsby tailored bright illumination. Nature Photon. 4, 686-689 (2010).
    • (2010) Nature Photon , vol.4 , pp. 686-689
    • Lydersen, L.1
  • 8
    • 79959230884 scopus 로고    scopus 로고
    • Full-field implementation of a perfect eavesdropper on a quantum cryptography system
    • Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Commun. 2, 349 (2011).
    • (2011) Nature Commun , vol.2 , pp. 349
    • Gerhardt, I.1
  • 10
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • Ekert, A. K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661-663 (1991).
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 11
    • 27144477301 scopus 로고    scopus 로고
    • No signalling and quantum key distribution
    • Barrett, J., Hardy, L. & Kent, A. No signalling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005).
    • (2005) Phys. Rev. Lett , vol.95 , pp. 010503
    • Barrett, J.1    Hardy, L.2    Kent, A.3
  • 13
    • 33746830453 scopus 로고    scopus 로고
    • Efficient quantum key distribution secure against no-signalling eavesdroppers
    • Aćn, A., Massar, S. & Pironio, S. Efficient quantum key distribution secure against no-signalling eavesdroppers. N. J. Phys. 8, 126 (2006).
    • (2006) N. J. Phys , vol.8 , pp. 126
    • Aćn, A.1    Massar, S.2    Pironio, S.3
  • 14
    • 65549151429 scopus 로고    scopus 로고
    • Universally composable privacy amplification from causality constraints
    • Masanes, L. Universally composable privacy amplification from causality constraints. Phys. Rev. Lett. 102, 140501 (2009).
    • (2009) Phys. Rev. Lett , vol.102 , pp. 140501
    • Masanes, L.1
  • 15
    • 77954653828 scopus 로고    scopus 로고
    • Proc. EUROCRYPT ed. Gilbert H Springer
    • Hänggi, E., Renner, R. & Wolf, S. in Proc. EUROCRYPT (ed. Gilbert, H.) 216-234 (LNCS 6110, Springer, 2010).
    • (2010) LNCS , vol.6110 , pp. 216-234
    • Hänggi, E.1    Renner, R.2    Wolf, S.3
  • 16
    • 34547380185 scopus 로고    scopus 로고
    • Device-independent security of quantum cryptography against collective attacks
    • Aćn, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
    • (2007) Phys. Rev. Lett , vol.98 , pp. 230501
    • Aćn, A.1
  • 17
    • 66549107253 scopus 로고    scopus 로고
    • Device-independent quantum key distribution secure against collective attacks
    • Pironio, S. et al. Device-independent quantum key distribution secure against collective attacks. N. J. Phys. 11, 045021 (2009).
    • (2009) N. J. Phys , vol.11 , pp. 045021
    • Pironio, S.1
  • 18
    • 72149091696 scopus 로고    scopus 로고
    • Device independent quantum key distribution secure against coherent attacks withmemorylessmeasurement devices
    • McKague,M. Device independent quantum key distribution secure against coherent attacks withmemorylessmeasurement devices. N. J. Phys. 11, 103037 (2009).
    • (2009) N. J. Phys , vol.11 , pp. 103037
    • McKague, M.1
  • 20
    • 79952712286 scopus 로고    scopus 로고
    • Secure device-independentquantumkey distribution with causally independentmeasurement devices
    • Masanes,L.,Pironio,S.&Aćn, A.Secure device- independentquantumkey distribution with causally independentmeasurement devices. Nature Commun. 2, 238 (2011).
    • (2011) Nature Commun , vol.2 , pp. 238
    • Masanes, L.1    Pironio, S.2    Aćn, A.3
  • 21
    • 0002863426 scopus 로고
    • Bounds for the quantity of information transmitted by a quantum communication channel
    • Holevo, A. S. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 9, 177-183 (1973).
    • (1973) Probl. Inf. Transm , vol.9 , pp. 177-183
    • Holevo, A.S.1
  • 22
    • 0000486090 scopus 로고
    • On the Einstein-Podolsky-Rosen paradox
    • Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964).
    • (1964) Physics , vol.1 , pp. 195-200
    • Bell, J.S.1
  • 23
    • 36049056258 scopus 로고
    • Proposed experiment to test local hidden-variable theories
    • Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884 (1969).
    • (1969) Phys. Rev. Lett , vol.23 , pp. 880-884
    • Clauser, J.F.1    Horne, M.A.2    Shimony, A.3    Holt, R.A.4
  • 24
    • 34250250611 scopus 로고
    • Quantum generalizations of Bell's inequality
    • Cirel'son, B. S. Quantum generalizations of Bell's inequality. Lett. Math. Phys. 4, 93-100 (1980).
    • (1980) Lett. Math. Phys , vol.4 , pp. 93-100
    • Cirel'Son, B.S.1
  • 25
    • 0001583853 scopus 로고
    • Maximal violation of Bell inequalities for mixed states
    • Braunstein, S. L., Mann, A. & Revzen, M. Maximal violation of Bell inequalities for mixed states. Phys. Rev. Lett. 68, 3259-3261 (1992).
    • (1992) Phys. Rev. Lett , vol.68 , pp. 3259-3261
    • Braunstein, S.L.1    Mann, A.2    Revzen, M.3
  • 26
    • 0038939715 scopus 로고
    • Which states violate Bell's inequality maximally?
    • Popescu, S. & Rohrlich, D. Which states violate Bell's inequality maximally? Phys. Lett. A 169, 411-414 (1992).
    • (1992) Phys. Lett. A , vol.169 , pp. 411-414
    • Popescu, S.1    Rohrlich, D.2
  • 27
    • 33746352092 scopus 로고    scopus 로고
    • Proc. Int.Coll. on Automata, Languages and Programming (ICALP) eds Bugliesi,M. et al Springer
    • Magniez, F.,Mayers,D.,Mosca, M.&Ollivier, H. in Proc. Int.Coll. onAutomata, Languages andProgramming (ICALP) (eds Bugliesi,M. et al.)72-83(LNCS4051,Springer,2006).
    • (2006) LNCS , vol.4051 , pp. 72-83
    • Magniez, F.1    Mayers, D.2    Mosca, M.3    Ollivier, H.4
  • 28
    • 84868282420 scopus 로고    scopus 로고
    • Robust self-testing of the singlet
    • McKague, M., Yang, T. H. & Scarani, V. Robust self-testing of the singlet. J. Phys. A 45, 455304 (2012).
    • (2012) J. Phys. A , vol.45 , pp. 455304
    • McKague, M.1    Yang, T.H.2    Scarani, V.3
  • 30
    • 0033604507 scopus 로고    scopus 로고
    • Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations
    • Gottesman, D. & Chuang, I. L. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402, 390-393 (1999).
    • (1999) Nature , vol.402 , pp. 390-393
    • Gottesman, D.1    Chuang, I.L.2
  • 31
    • 0037473943 scopus 로고    scopus 로고
    • PSPACE has constant-round quantum interactive proof systems
    • Watrous, J. PSPACE has constant-round quantum interactive proof systems. Theor. Comput. Sci. 292, 575-588 (2003).
    • (2003) Theor. Comput. Sci , vol.292 , pp. 575-588
    • Watrous, J.1
  • 33
    • 84856074693 scopus 로고    scopus 로고
    • Demonstration of blind quantumcomputing
    • Barz, S. et al. Demonstration of blind quantumcomputing. Science 335, 303-308 (2012).
    • (2012) Science , vol.335 , pp. 303-308
    • Barz, S.1
  • 35
    • 0000107375 scopus 로고
    • Essai sur la géométrie à ndimensions
    • Jordan, C. Essai sur la géométrie à ndimensions. Bull. Soc.Math. Fr. 3,103-174(1875).
    • (1875) Bull. Soc.Math. Fr , vol.3 , pp. 103-174
    • Jordan, C.1
  • 37
    • 77952728045 scopus 로고    scopus 로고
    • Noise stability of functions with low influences: Invariance and optimality
    • Mossel, E., O'Donnell, R. & Oleszkiewicz, K. Noise stability of functions with low influences: invariance and optimality. Ann. Math. 171, 295-341 (2010).
    • (2010) Ann. Math , vol.171 , pp. 295-341
    • Mossel, E.1    O'Donnell, R.2    Oleszkiewicz, K.3
  • 40
    • 68149178814 scopus 로고    scopus 로고
    • Using entanglement in quantum multi-prover interactive proofs
    • Kempe, J., Kobayashi, H., Matsumoto, K. & Vidick, T. Using entanglement in quantum multi-prover interactive proofs. Comput. Complex. 18, 273-307 (2009).
    • (2009) Comput. Complex , vol.18 , pp. 273-307
    • Kempe, J.1    Kobayashi, H.2    Matsumoto, K.3    Vidick, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.