메뉴 건너뛰기




Volumn 9780521827409, Issue , 2006, Pages 1-287

Protecting information: From classical error correction to quantum cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ERROR CORRECTION; PUBLIC KEY CRYPTOGRAPHY; QUANTUM COMPUTERS; QUANTUM CRYPTOGRAPHY; QUANTUM OPTICS; QUANTUM THEORY;

EID: 84924440871     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511813719     Document Type: Book
Times cited : (54)

References (86)
  • 3
    • 74549224309 scopus 로고    scopus 로고
    • Principles of quantum computation and information
    • (World Scientific, Singapore
    • Benenti, G., G. Casati, and G. Strini, Principles of Quantum Computation and Information, Volume I: Basic Concepts (World Scientific, Singapore, 2004).
    • (2004) Volume I: Basic Concepts
    • Benenti, G.1    Casati, G.2    Strini, G.3
  • 4
    • 0015680909 scopus 로고
    • Logical reversibility of computation
    • Bennett, C. H., “Logical reversibility of computation,” IBM J. Res. Develop. 17, 525–532 (1973).
    • (1973) IBM J. Res. Develop , vol.17 , pp. 525-532
    • Bennett, C.H.1
  • 7
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Bennett, C. H., G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM J. Comput. 17, 210–229 (1988).
    • (1988) SIAM J. Comput , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 9
    • 4243059985 scopus 로고
    • Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels
    • Bennett, C. H., G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,” Phys. Rev. Lett. 70, 1895–1899 (1993).
    • (1993) Phys. Rev. Lett , vol.70 , pp. 1895-1899
    • Bennett, C.H.1    Brassard, G.2    Crépeau, C.3    Jozsa, R.4    Peres, A.5    Wootters, W.K.6
  • 16
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • Brassard, G., and L. Salvail, “Secret-key reconciliation by public discussion,” Lect. Notes Comput. Sci. 765, 410–423 (1993).
    • (1993) Lect. Notes Comput. Sci , vol.765 , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 17
    • 2442492740 scopus 로고    scopus 로고
    • Quantum repeaters: The role of imperfect local operations in quantum communication
    • Briegel, H.-J., W. Dür, J. I. Cirac, and P. Zoller, “Quantum repeaters: The role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81, 5932–5935 (1998).
    • (1998) Phys. Rev. Lett , vol.81 , pp. 5932-5935
    • Briegel, H.-J.1    Dür, W.2    Cirac, J.I.3    Zoller, P.4
  • 18
    • 0033307882 scopus 로고    scopus 로고
    • On universal and fault-tolerant quantum computing:Anovel basis and a new constructive proof of universality for shors basis
    • IEEE Computer Society Press, Los Alamitos, CA
    • Boykin, P. O., T. Mor, M. Pulver, V. Rowchowdhury, and F. Vatan, “On universal and fault-tolerant quantum computing:Anovel basis and a new constructive proof of universality for Shor’s basis,” in Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS’99) (IEEE Computer Society Press, Los Alamitos, CA, 1999), pp. 486–494.
    • (1999) Proceedings of the 40Th Annual Symposium on Foundations of Computer Science (FOCS’99) , pp. 486-494
    • Boykin, P.O.1    Mor, T.2    Pulver, M.3    Rowchowdhury, V.4    Vatan, F.5
  • 19
    • 0036997507 scopus 로고    scopus 로고
    • Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
    • Chau, H. F., “Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate,” Phys. rev. A 66, 60302 (2002).
    • (2002) Phys. Rev. A , vol.66
    • Chau, H.F.1
  • 21
    • 11744326454 scopus 로고    scopus 로고
    • Experimental implementation of fast quantum searching
    • Chuang, I. L., N. Gershenfeld, and M. Kubinec, “Experimental implementation of fast quantum searching,” Phys. Rev. Lett. 80, 3408–3411 (1998).
    • (1998) Phys. Rev. Lett , vol.80 , pp. 3408-3411
    • Chuang, I.L.1    Gershenfeld, N.2    Kubinec, M.3
  • 22
    • 0027610980 scopus 로고
    • Modifications to the number field sieve
    • Coppersmith, D., “Modifications to the number field sieve,” J. Cryptology 6, 169–180 (1993).
    • (1993) J. Cryptology , vol.6 , pp. 169-180
    • Coppersmith, D.1
  • 23
    • 0003260561 scopus 로고
    • An approximate fourier transform useful in quantum factoring
    • Coppersmith, D., “An approximate Fourier transform useful in quantum factoring,” IBM Research Report RC 19642 (1994).
    • (1994) IBM Research Report RC 19642
    • Coppersmith, D.1
  • 25
  • 26
    • 6144265213 scopus 로고    scopus 로고
    • Quantum privacy amplification and the security of quantum cryptography over noisy channels
    • Deutsch, D., A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, “Quantum privacy amplification and the security of quantum cryptography over noisy channels,” Phys. Rev. Lett. 77, 2818–2821 (1996).
    • (1996) Phys. Rev. Lett , vol.77 , pp. 2818-2821
    • Deutsch, D.1    Ekert, A.2    Jozsa, R.3    Macchiavello, C.4    Popescu, S.5    Sanpera, A.6
  • 27
    • 0022421379 scopus 로고
    • Quantum theory, the church-turing principle and the universal quantum computer
    • Deutsch, D., “Quantum theory, the Church-Turing Principle and the universal quantum computer,” Proc. Roy. Soc. Lond. A 400, 97 (1985).
    • (1985) Proc. Roy. Soc. Lond. A , vol.400
    • Deutsch, D.1
  • 28
    • 33750978344 scopus 로고
    • Communication by epr devices
    • Dieks, D. “Communication by EPR devices” Phys. Lett. A 92, 271–272 (1982).
    • (1982) Phys. Lett. A , vol.92 , pp. 271-272
    • Dieks, D.1
  • 29
    • 33751021446 scopus 로고
    • Two-bit gates are universal for quantum computation
    • DiVincenzo, D. P., “Two-bit gates are universal for quantum computation,” Phys. Rev. A 51, 1015–1022 (1995).
    • (1995) Phys. Rev. A , vol.51 , pp. 1015-1022
    • DiVincenzo, D.P.1
  • 31
    • 0343152990 scopus 로고
    • Quantum cryptography based on bells theorem
    • Ekert, A. K., “Quantum cryptography based on Bell’s theorem” Phys. Rev. Lett. 67, 661–663 (1991).
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 32
    • 0030520263 scopus 로고    scopus 로고
    • Quantum computation and shors factoring algorithm
    • Ekert, A., and R. Jozsa, “Quantum computation and Shor’s factoring algorithm,” Rev. Mod. Phys. 68, 733–753 (1996).
    • (1996) Rev. Mod. Phys , vol.68 , pp. 733-753
    • Ekert, A.1    Jozsa, R.2
  • 34
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography. I. information bound and optimal strategy
    • Fuchs, C. A., N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, “Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy,” Phys. Rev. A 56, 1163–1172 (1997).
    • (1997) Phys. Rev. A , vol.56 , pp. 1163-1172
    • Fuchs, C.A.1    Gisin, N.2    Griffiths, R.B.3    Niu, C.-S.4    Peres, A.5
  • 37
    • 21244493696 scopus 로고    scopus 로고
    • Shors factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers
    • Gerjuoy, E., “Shor’s factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers,” Am. J. Phys. 73, 521 (2005).
    • (2005) Am. J. Phys , vol.73
    • Gerjuoy, E.1
  • 42
    • 4243807288 scopus 로고    scopus 로고
    • Quantum mechanics helps in searching for a needle in a haystack
    • Grover, L., “Quantum mechanics helps in searching for a needle in a haystack,” Phys. Rev. Lett. 79, 325 (1997).
    • (1997) Phys. Rev. Lett , vol.79
    • Grover, L.1
  • 43
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • Hamming, R.W., “Error detecting and error correcting codes,” Bell Syst. Tech. J., 29, 147–160 (1950).
    • (1950) Bell Syst. Tech. J , vol.29 , pp. 147-160
    • Hamming, R.W.1
  • 46
    • 0040052002 scopus 로고    scopus 로고
    • “quantumcomputations: Algorithms and error correction
    • Kitaev, A.Y.,“Quantumcomputations: Algorithms and error correction,” Russ. Math. Surv. 52, 1191–1249 (1997).
    • (1997) Russ. Math. Surv , vol.52 , pp. 1191-1249
    • Kitaev, A.Y.1
  • 48
    • 27144544067 scopus 로고    scopus 로고
    • Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication
    • Kraus, B., N. Gisin, and R. Renner, “Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication,” Phys. Rev. Lett. 95, 080501 (2005).
    • (2005) Phys. Rev. Lett , vol.80501
    • Kraus, B.1    Gisin, N.2    Renner, R.3
  • 52
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • Lo, H.-K., and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283, 2050 (1999).
    • (1999) Science , vol.283
    • Lo, H.-K.1    Chau, H.F.2
  • 54
    • 0030219216 scopus 로고    scopus 로고
    • Near shannon limit performance of low density parity check codes
    • MacKay, D. J. C., and R. M. Neal, “Near Shannon limit performance of low density parity check codes,” Electron. Lett. 32(18), 1645–1646 (1996).
    • (1996) Electron. Lett , vol.32 , Issue.18 , pp. 1645-1646
    • MacKay, D.1    Neal, R.M.2
  • 56
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • Mayers, D., “Unconditional security in quantum cryptography,” JACM 48, 351–406 (2001).
    • (2001) JACM , vol.48 , pp. 351-406
    • Mayers, D.1
  • 57
    • 0037239692 scopus 로고    scopus 로고
    • From cbits to qbits: Teaching computer scientists quantum mechanics
    • Mermin, N. D., “From Cbits to Qbits: Teaching computer scientists quantum mechanics,” Am. J. Phys. 71, 23–30 (2003).
    • (2003) Am. J. Phys , vol.71 , pp. 23-30
    • Mermin, N.D.1
  • 65
    • 0004203815 scopus 로고    scopus 로고
    • Fault-tolerant quantum computation
    • edited by H.-K. Lo, T. Spiller, and S. Popescu (World Scientific, Singapore
    • Preskill, J., “Fault-tolerant quantum computation,” in Quantum Information and Computation, edited by H.-K. Lo, T. Spiller, and S. Popescu (World Scientific, Singapore, 1998).
    • (1998) Quantum Information and Computation
    • Preskill, J.1
  • 67
    • 0003145851 scopus 로고
    • On the foundations of information theory
    • Rényi, A., “On the foundations of information theory,” Rev. Int. Statist. Inst. 33, 1 (1965).
    • (1965) Rev. Int. Statist. Inst , vol.33
    • Rényi, A.1
  • 69
    • 0000313016 scopus 로고    scopus 로고
    • An introduction to quantum computing for non-physicists
    • Rieffel, E. G., and W. Polak, “An introduction to quantum computing for non-physicists,” ACM Comput. Surv. 32, 300–335 (2000).
    • (2000) ACM Comput. Surv , vol.32 , pp. 300-335
    • Rieffel, E.G.1    Polak, W.2
  • 71
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • Shannon, C. E., “A mathematical theory of communication,” Bell Syst. Tech. J., 27, 379–423, 623–656 (1948).
    • (1948) Bell Syst. Tech. J. , vol.27
    • Shannon, C.E.1
  • 72
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C. E., “Communication theory of secrecy systems,” Bell. Sys. Tech. J. 28, 656 (1949).
    • (1949) Bell. Sys. Tech. J , vol.28
    • Shannon, C.E.1
  • 73
    • 85115374351 scopus 로고
    • Algorithms for quantum computation: Discrete logarithms and factoring
    • edited by S. Goldwasser (IEEE Computer Society Press, Los Alamitos, CA
    • Shor, P. W., “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, edited by S. Goldwasser (IEEE Computer Society Press, Los Alamitos, CA, 1994), pp. 124–134.
    • (1994) Proceedings of the 35Th Annual Symposium on the Foundations of Computer Science , pp. 124-134
    • Shor, P.W.1
  • 74
    • 33746738958 scopus 로고
    • Scheme for reducing decoherence in a quantum computer memory
    • Shor, P., “Scheme for reducing decoherence in a quantum computer memory,” Phys. Rev. A 52, 2493 (1995).
    • (1995) Phys. Rev. A , vol.52
    • Shor, P.1
  • 75
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P. W. “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comput. 26, 1484 (1997).
    • (1997) SIAM J. Comput , vol.26
    • Shor, P.W.1
  • 76
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the bb84 quantum key distribution protocol
    • Shor, P.W., and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. 85, 441 (2000).
    • (2000) Phys. Rev. Lett , vol.85
    • Shor, P.W.1    Preskill, J.2
  • 82
    • 0035924370 scopus 로고    scopus 로고
    • Experimental realization of shors quantum factoring algorithm using nuclear magnetic resonance
    • Vandersypen, L. M. K., M. Steffen, G. Breyta, C. S. Yannoni, M. H. Sherwood, and I. L. Chuang, “Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance,” Nature 414, 883– 887 (2001).
    • (2001) Nature , vol.414
    • Vandersypen, L.1    Steffen, M.2    Breyta, G.3    Yannoni, C.S.4    Sherwood, M.H.5    Chuang, I.L.6
  • 84
    • 0001998264 scopus 로고
    • Conjugate coding
    • Wiesner, S., “Conjugate coding,” SIGACT News 15, 77 (1983).
    • (1983) SIGACT News , vol.15
    • Wiesner, S.1
  • 85
    • 33746708860 scopus 로고
    • A single quantum cannot be cloned
    • Wootters, W. K., and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 802–803 (1982).
    • (1982) Nature , vol.299 , pp. 802-803
    • Wootters, W.K.1    Zurek, W.H.2
  • 86
    • 18744370660 scopus 로고
    • Bells-inequality experiments using independent-particle sources
    • Yurke, B. and D. Stoler, “Bell’s-inequality experiments using independent-particle sources,” Phys. Rev. A 46, 2229 (1992).
    • (1992) Phys. Rev. A , vol.46
    • Yurke, B.1    Stoler, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.