-
1
-
-
79956262174
-
-
ed. Yao A Tsinghua Univ. Press
-
Aharonov, D., Ben-Or, M. & Eban, E. in Proc. Innovations in Computer Science (ICS) (ed. Yao, A.) 453-469 (Tsinghua Univ. Press, 2010).
-
(2010)
Proc. Innovations in Computer Science (ICS)
, pp. 453-469
-
-
Aharonov, D.1
Ben-Or, M.2
Eban, E.3
-
4
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
Lo, H.-K. & Chau, H. F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050-2056 (1999).
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
5
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441-444 (2000).
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
6
-
-
55049100546
-
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems
-
Zhao, Y., Fung, C.-H. F., Qi, B., Chen, C. & Lo, H.-K. Quantum hacking: experimental demonstration of time-shift attack against practical quantum key distribution systems. Phys. Rev. A 78, 042333 (2008).
-
(2008)
Phys. Rev. A
, vol.78
, pp. 042333
-
-
Zhao, Y.1
Fung, C.-H.F.2
Qi, B.3
Chen, C.4
Lo, H.-K.5
-
7
-
-
77957566438
-
Hacking commercial quantumcryptography systemsby tailored bright illumination
-
Lydersen, L. et al. Hacking commercial quantumcryptography systemsby tailored bright illumination. Nature Photon. 4, 686-689 (2010).
-
(2010)
Nature Photon
, vol.4
, pp. 686-689
-
-
Lydersen, L.1
-
8
-
-
79959230884
-
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
-
Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Commun. 2, 349 (2011).
-
(2011)
Nature Commun
, vol.2
, pp. 349
-
-
Gerhardt, I.1
-
10
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert, A. K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661-663 (1991).
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
11
-
-
27144477301
-
No signalling and quantum key distribution
-
Barrett, J., Hardy, L. & Kent, A. No signalling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005).
-
(2005)
Phys. Rev. Lett
, vol.95
, pp. 010503
-
-
Barrett, J.1
Hardy, L.2
Kent, A.3
-
12
-
-
79951822794
-
-
Preprint at
-
Masanes, L., Renner, R., Christandl, M., Winter, A. & Barrett, J. Unconditional security of key distribution fromcausality constraints. Preprint at http://arXiv.org/abs/quant-ph/0606049 (2006).
-
(2006)
Unconditional Security of Key Distribution Fromcausality Constraints
-
-
Masanes, L.1
Renner, R.2
Christandl, M.3
Winter, A.4
Barrett, J.5
-
13
-
-
33746830453
-
Efficient quantum key distribution secure against no-signalling eavesdroppers
-
Aćn, A., Massar, S. & Pironio, S. Efficient quantum key distribution secure against no-signalling eavesdroppers. N. J. Phys. 8, 126 (2006).
-
(2006)
N. J. Phys
, vol.8
, pp. 126
-
-
Aćn, A.1
Massar, S.2
Pironio, S.3
-
14
-
-
65549151429
-
Universally composable privacy amplification from causality constraints
-
Masanes, L. Universally composable privacy amplification from causality constraints. Phys. Rev. Lett. 102, 140501 (2009).
-
(2009)
Phys. Rev. Lett
, vol.102
, pp. 140501
-
-
Masanes, L.1
-
15
-
-
77954653828
-
-
Proc. EUROCRYPT ed. Gilbert H Springer
-
Hänggi, E., Renner, R. & Wolf, S. in Proc. EUROCRYPT (ed. Gilbert, H.) 216-234 (LNCS 6110, Springer, 2010).
-
(2010)
LNCS
, vol.6110
, pp. 216-234
-
-
Hänggi, E.1
Renner, R.2
Wolf, S.3
-
16
-
-
34547380185
-
Device-independent security of quantum cryptography against collective attacks
-
Aćn, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 230501
-
-
Aćn, A.1
-
17
-
-
66549107253
-
Device-independent quantum key distribution secure against collective attacks
-
Pironio, S. et al. Device-independent quantum key distribution secure against collective attacks. N. J. Phys. 11, 045021 (2009).
-
(2009)
N. J. Phys
, vol.11
, pp. 045021
-
-
Pironio, S.1
-
18
-
-
72149091696
-
Device independent quantum key distribution secure against coherent attacks withmemorylessmeasurement devices
-
McKague,M. Device independent quantum key distribution secure against coherent attacks withmemorylessmeasurement devices. N. J. Phys. 11, 103037 (2009).
-
(2009)
N. J. Phys
, vol.11
, pp. 103037
-
-
McKague, M.1
-
20
-
-
79952712286
-
Secure device-independentquantumkey distribution with causally independentmeasurement devices
-
Masanes,L.,Pironio,S.&Aćn, A.Secure device- independentquantumkey distribution with causally independentmeasurement devices. Nature Commun. 2, 238 (2011).
-
(2011)
Nature Commun
, vol.2
, pp. 238
-
-
Masanes, L.1
Pironio, S.2
Aćn, A.3
-
21
-
-
0002863426
-
Bounds for the quantity of information transmitted by a quantum communication channel
-
Holevo, A. S. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 9, 177-183 (1973).
-
(1973)
Probl. Inf. Transm
, vol.9
, pp. 177-183
-
-
Holevo, A.S.1
-
22
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964).
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
23
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884 (1969).
-
(1969)
Phys. Rev. Lett
, vol.23
, pp. 880-884
-
-
Clauser, J.F.1
Horne, M.A.2
Shimony, A.3
Holt, R.A.4
-
24
-
-
34250250611
-
Quantum generalizations of Bell's inequality
-
Cirel'son, B. S. Quantum generalizations of Bell's inequality. Lett. Math. Phys. 4, 93-100 (1980).
-
(1980)
Lett. Math. Phys
, vol.4
, pp. 93-100
-
-
Cirel'Son, B.S.1
-
25
-
-
0001583853
-
Maximal violation of Bell inequalities for mixed states
-
Braunstein, S. L., Mann, A. & Revzen, M. Maximal violation of Bell inequalities for mixed states. Phys. Rev. Lett. 68, 3259-3261 (1992).
-
(1992)
Phys. Rev. Lett
, vol.68
, pp. 3259-3261
-
-
Braunstein, S.L.1
Mann, A.2
Revzen, M.3
-
26
-
-
0038939715
-
Which states violate Bell's inequality maximally?
-
Popescu, S. & Rohrlich, D. Which states violate Bell's inequality maximally? Phys. Lett. A 169, 411-414 (1992).
-
(1992)
Phys. Lett. A
, vol.169
, pp. 411-414
-
-
Popescu, S.1
Rohrlich, D.2
-
27
-
-
33746352092
-
-
Proc. Int.Coll. on Automata, Languages and Programming (ICALP) eds Bugliesi,M. et al Springer
-
Magniez, F.,Mayers,D.,Mosca, M.&Ollivier, H. in Proc. Int.Coll. onAutomata, Languages andProgramming (ICALP) (eds Bugliesi,M. et al.)72-83(LNCS4051,Springer,2006).
-
(2006)
LNCS
, vol.4051
, pp. 72-83
-
-
Magniez, F.1
Mayers, D.2
Mosca, M.3
Ollivier, H.4
-
28
-
-
84868282420
-
Robust self-testing of the singlet
-
McKague, M., Yang, T. H. & Scarani, V. Robust self-testing of the singlet. J. Phys. A 45, 455304 (2012).
-
(2012)
J. Phys. A
, vol.45
, pp. 455304
-
-
McKague, M.1
Yang, T.H.2
Scarani, V.3
-
30
-
-
0033604507
-
Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations
-
Gottesman, D. & Chuang, I. L. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402, 390-393 (1999).
-
(1999)
Nature
, vol.402
, pp. 390-393
-
-
Gottesman, D.1
Chuang, I.L.2
-
31
-
-
0037473943
-
PSPACE has constant-round quantum interactive proof systems
-
Watrous, J. PSPACE has constant-round quantum interactive proof systems. Theor. Comput. Sci. 292, 575-588 (2003).
-
(2003)
Theor. Comput. Sci
, vol.292
, pp. 575-588
-
-
Watrous, J.1
-
33
-
-
84856074693
-
Demonstration of blind quantumcomputing
-
Barz, S. et al. Demonstration of blind quantumcomputing. Science 335, 303-308 (2012).
-
(2012)
Science
, vol.335
, pp. 303-308
-
-
Barz, S.1
-
35
-
-
0000107375
-
Essai sur la géométrie à ndimensions
-
Jordan, C. Essai sur la géométrie à ndimensions. Bull. Soc.Math. Fr. 3,103-174(1875).
-
(1875)
Bull. Soc.Math. Fr
, vol.3
, pp. 103-174
-
-
Jordan, C.1
-
37
-
-
77952728045
-
Noise stability of functions with low influences: Invariance and optimality
-
Mossel, E., O'Donnell, R. & Oleszkiewicz, K. Noise stability of functions with low influences: invariance and optimality. Ann. Math. 171, 295-341 (2010).
-
(2010)
Ann. Math
, vol.171
, pp. 295-341
-
-
Mossel, E.1
O'Donnell, R.2
Oleszkiewicz, K.3
-
40
-
-
68149178814
-
Using entanglement in quantum multi-prover interactive proofs
-
Kempe, J., Kobayashi, H., Matsumoto, K. & Vidick, T. Using entanglement in quantum multi-prover interactive proofs. Comput. Complex. 18, 273-307 (2009).
-
(2009)
Comput. Complex
, vol.18
, pp. 273-307
-
-
Kempe, J.1
Kobayashi, H.2
Matsumoto, K.3
Vidick, T.4
|