메뉴 건너뛰기




Volumn 9780521864855, Issue , 2006, Pages 1-261

Quantum cryptography and secret-key distillation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DISTILLATION; ENGINEERING EDUCATION; QUANTUM THEORY; STUDENTS;

EID: 84925088957     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511617744     Document Type: Book
Times cited : (169)

References (196)
  • 2
    • 4544351377 scopus 로고    scopus 로고
    • Experimental open-air quantum key distribution with a single-photon source
    • R., Alléaume, F., Treussart, G., Messin et al., Experimental open-air quantum key distribution with a single-photon source, New J. Phys. 6, 92 (2004).
    • (2004) New J. Phys , vol.6 , pp. 92
    • Alléaume, R.1    Treussart, F.2    Messin, G.3
  • 3
    • 0030241020 scopus 로고    scopus 로고
    • Source coding and graph entropies
    • N., Alon and A., Orlitsky, Source coding and graph entropies, IEEE Trans. Inform. Theory 42, 1329-1339 (1996).
    • (1996) IEEE Trans. Inform. Theory , vol.42 , pp. 1329-1339
    • Alon, N.1    Orlitsky, A.2
  • 5
  • 6
    • 84925092204 scopus 로고
    • Analog speech security systems
    • Lecture Notes in Computer Science
    • H., J. Beker, Analog speech security systems, Advances in Cryptology - Eurocrypt ’82, Lecture Notes in Computer Science, 130-146 (1982).
    • (1982) Advances in Cryptology - Eurocrypt , vol.82 , pp. 130-146
    • J. Beker, H.1
  • 7
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Lecture Notes in Computer Science
    • M., Bellare, R., Canetti and H., Krawczyk, Keying hash functions for message authentication, Advances in Cryptology – Crypto.‘96, Lecture Notes in Computer Science, 1-15 (1996).
    • (1996) Advances in Cryptology – Crypto , vol.96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
    • 0035841904 scopus 로고    scopus 로고
    • Quantum key distribution with continuous variables
    • K., Bencheikh, T., Symul, A., Jankovic and J.-A., Levenson, Quantum key distribution with continuous variables, J. Mod. Opt. 48, 1903-1920 (2001).
    • (2001) J. Mod. Opt , vol.48 , pp. 1903-1920
    • Bencheikh, K.1    Symul, T.2    Jankovic, A.3    Levenson, J.-A.4
  • 11
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C., H. Bennett, G., Brassard and J., Robert, Privacy amplification by public discussion, Si Am J. Comput. 17, 210-229 (1988).
    • (1988) Siam J. Comput , vol.17 , pp. 210-229
    • H. Bennett, C.1    Brassard, G.2    Robert, J.3
  • 14
    • 11944254075 scopus 로고
    • Quantum cryptography using any two non-orthogonal states
    • C., H. Bennett, Quantum cryptography using any two non-orthogonal states, Phys. Rev. Lett. 68, 3121-3124 (1992).
    • (1992) Phys. Rev. Lett , vol.68 , pp. 3121-3124
    • H. Bennett, C.1
  • 16
    • 4243789313 scopus 로고    scopus 로고
    • Purification of noisy entanglement and faithful teleportation via noisy channels
    • C., H. Bennett, G., Brassard, S., Popescu et al., Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett. 76, 722-725 (1996).
    • (1996) Phys. Rev. Lett , vol.76 , pp. 722-725
    • H. Bennett, C.1    Brassard, G.2    Popescu, S.3
  • 18
    • 0037139035 scopus 로고    scopus 로고
    • Enhanced autocompensating quantum cryptography system
    • D. S. Bethune, M. Navarro and W. P. Risk, Enhanced autocompensating quantum cryptography system, Appl. Opt. LP 41, 1640-1648 (2002).
    • (2002) Appl. Opt. LP , vol.41 , pp. 1640-1648
    • Bethune, D.S.1    Navarro, M.2    Risk, W.P.3
  • 19
  • 20
    • 84903595110 scopus 로고
    • Differential cryptanalysis of des-like cryptosystems
    • Lecture Notes in Computer Science
    • E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology – Crypto.‘90, Lecture Notes in Computer Science, 2-21 (1990).
    • (1990) Advances in Cryptology – Crypto , vol.90 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 21
    • 0026397734 scopus 로고
    • Differential cryptanalysis of des-like cryptosystems
    • E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, J. Cryptol. 4, 3-72 (1991).
    • (1991) J. Cryptol , vol.4 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 22
    • 0002683004 scopus 로고
    • Differential cryptanalysis of the full 16-round des
    • Lecture Notes in Computer Science
    • E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology – Crypto 92, Lecture Notes in Computer Science, 494-502 (1992).
    • (1992) Advances in Cryptology – Crypto , vol.92 , pp. 494-502
    • Biham, E.1    Shamir, A.2
  • 25
    • 33947271684 scopus 로고    scopus 로고
    • Efficient reconciliation of correlated continuous random variables using ldpc codes
    • cs.IT/0509041
    • M. Bloch, A. Thangaraj and S. W. McLaughlin, Efficient reconciliation of correlated continuous random variables using LDPC codes, arXiv e-print cs.IT/0509041 (2005).
    • (2005) Arxiv E-Print
    • Bloch, M.1    Thangaraj, A.2    McLaughlin, S.W.3
  • 26
    • 0000418120 scopus 로고    scopus 로고
    • Experiments on long- wavelength (1550 nm) ‘plug and play’ quantum cryptography systems
    • M. Bourennane, F. Gibson, A. Karlsson et al., Experiments on long- wavelength (1550 nm) ‘plug and play’ quantum cryptography systems, Opt. Express 4, 383-387 (1999).
    • (1999) Opt. Express , vol.4 , pp. 383-387
    • Bourennane, M.1    Gibson, F.2    Karlsson, A.3
  • 27
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • Lecture Notes in Computer Science
    • G. Brassard and L. Salvail, Secret-key reconciliation by public discussion, Advances in Cryptology – Eurocrypt.‘93, Lecture Notes in Computer Science, 410-423 (1993).
    • (1993) Advances in Cryptology – Eurocrypt , vol.93 , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 28
    • 0038129641 scopus 로고    scopus 로고
    • A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377
    • B. P. Brent, S. Larvala and P. Zimmermann, A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377, Math. Comp. 72, 1443-1452 (2003).
    • (2003) Math. Comp , vol.72 , pp. 1443-1452
    • Brent, B.P.1    Larvala, S.2    Zimmermann, P.3
  • 31
    • 0038783533 scopus 로고    scopus 로고
    • Fast, efficient error reconciliation for quantum cryptography
    • W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson et al., Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A 67, 052-303 (2003).
    • (2003) Phys. Rev. A , vol.67 , pp. 052-303
    • Buttler, W.T.1    Lamoreaux, S.K.2    Torgerson, J.R.3
  • 33
    • 0024627773 scopus 로고
    • Multilevel codes and multistage decoding
    • A. R. Calderbank, Multilevel codes and multistage decoding, IEEE Trans. Inform. Theory 37, 222-229 (1989).
    • (1989) IEEE Trans. Inform. Theory , vol.37 , pp. 222-229
    • Calderbank, A.R.1
  • 34
    • 0001398327 scopus 로고    scopus 로고
    • Good quantum error-correcting codes exist
    • A. R. Calderbank and P. W. Shor, Good quantum error-correcting codes exist, Phys. Rev. A 54, 1098-1105 (1996).
    • (1996) Phys. Rev. A , vol.54 , pp. 1098-1105
    • Calderbank, A.R.1    Shor, P.W.2
  • 39
    • 0034245761 scopus 로고    scopus 로고
    • Cloning of continuous quantum variables
    • N., J. Cerf, A., Ipe and X., Rottenberg, Cloning of continuous quantum variables, Phys. Rev. Lett. 85, 1754-1757 (2000).
    • (2000) Phys. Rev. Lett , vol.85 , pp. 1754-1757
    • J. Cerf, N.1    Ipe, A.2    Rottenberg, X.3
  • 40
    • 0035332232 scopus 로고    scopus 로고
    • Quantum distribution of gaussian keys using squeezed states
    • N., J. Cerf, M., Levy and G., Van Assche, Quantum distribution of Gaussian keys using squeezed states, Phys. Rev. A 63, 052-311 (2001).
    • (2001) Phys. Rev. A , vol.63 , pp. 052-311
    • J. Cerf, N.1    Levy, M.2    Van Assche, G.3
  • 42
    • 19844376567 scopus 로고    scopus 로고
    • A generic security proof for quantum key distribution
    • quant-ph/0402131
    • M., Christandl, R., Renner and A., Ekert, A generic security proof for quantum key distribution, ar Xiv e-print quant-ph/0402131 (2004).
    • (2004) Arxiv E-Print
    • Christandl, M.1    Renner, R.2    Ekert, A.3
  • 43
    • 85032399740 scopus 로고    scopus 로고
    • TM, http://www.comscire.com/Products/J1000KU/(2005).
    • (2005) Tm
  • 45
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Lecture Notes in Computer Science
    • N., T. Courtois and J., Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations, Advances in Cryptology - Asiacrypt 2002, Lecture Notes in Computer Science, 267-287 (2002).
    • (2002) Advances in Cryptology - Asiacrypt 2002 , pp. 267-287
    • T. Courtois, N.1    Pieprzyk, J.2
  • 48
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I., Csiszar and J., Körner, Broadcast channels with confidential messages, IEEE Trans. Inform. Theory 24, 339-348 (1978).
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 339-348
    • Csiszar, I.1    Körner, J.2
  • 49
    • 12044251580 scopus 로고
    • Circuit implementation of synchronized chaos with applications to communications
    • K., M. Cuomo and A., V. Oppenheim, Circuit implementation of synchronized chaos with applications to communications, Phys. Rev. Lett. 71, 65-68 (1993).
    • (1993) Phys. Rev. Lett , vol.71 , pp. 65-68
    • M. Cuomo, K.1    V. Oppenheim, A.2
  • 50
    • 0039047093 scopus 로고    scopus 로고
    • Systematic and statistical errors in homodyne measurements of the density matrix
    • G., M. D’Ariano, C., Macchiavello and N., Sterpi, Systematic and statistical errors in homodyne measurements of the density matrix, Quantum Semiclass. Opt. 9, 929-939 (1997).
    • (1997) Quantum Semiclass. Opt , vol.9 , pp. 929-939
    • M. D’Ariano, G.1    Macchiavello, C.2    Sterpi, N.3
  • 53
    • 19544378326 scopus 로고    scopus 로고
    • Relating quantum privacy and quantum coherence: An operational approach
    • I., Devetak and A., Winter, Relating quantum privacy and quantum coherence: an operational approach, Phys. Rev. Lett. 93, 080-501 (2004).
    • (2004) Phys. Rev. Lett , vol.93 , pp. 080-501
    • Devetak, I.1    Winter, A.2
  • 56
    • 33947385649 scopus 로고
    • Can quantum-mechanical description of physical reality be considered complete?
    • A., Einstein, B., Podolsky and N., Rosen, Can quantum-mechanical description of physical reality be considered complete?, Phys. Rev. 47, 777-780 (1935).
    • (1935) Phys. Rev , vol.47 , pp. 777-780
    • Einstein, A.1    Podolsky, B.2    Rosen, N.3
  • 57
    • 1242285756 scopus 로고    scopus 로고
    • Building the quantum network
    • C., Elliott, Building the quantum network, New J. Phys. 4, 46 (2002).
    • (2002) New J. Phys , vol.4 , pp. 46
    • Elliott, C.1
  • 60
    • 84925049140 scopus 로고
    • Washington D.C., National Bureau of Standards, U.S. Department of Commerce
    • Federal Information Processing Standard (FIPS), Data Encryption Standard, Publication 46, Washington D.C., National Bureau of Standards, U.S. Department of Commerce (1977).
    • (1977) Data Encryption Standard, Publication , vol.46
  • 61
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography. I information bound and optimal strategy
    • C., A. Fuchs, N., Gisin, R., B. Griffiths, C.-S., Niu and A., Peres, Optimal eavesdropping in quantum cryptography. I Information bound and optimal strategy, Phys. Rev. A 56, 1163-1172 (1997).
    • (1997) Phys. Rev. A , vol.56 , pp. 1163-1172
    • A. Fuchs, C.1    Gisin, N.2    B. Griffiths, R.3    Niu, C.-S.4    Peres, A.5
  • 65
    • 33646373811 scopus 로고    scopus 로고
    • Trojan horse attacks on quantum key distribution systems
    • quant-ph/0507063
    • N., Gisin, S., Fasel, B., Kraus, H., Zbinden and G., Ribordy, Trojan horse attacks on quantum key distribution systems, ar Xiv e-print quant-ph/0507063 (2005).
    • (2005) Arxiv E-Print
    • Gisin, N.1    Fasel, S.2    Kraus, B.3    Zbinden, H.4    Ribordy, G.5
  • 66
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122 km of standard telecom fiber
    • Gobby, Z. L. Yuan and A., J. Shields, Quantum key distribution over 122 km of standard telecom fiber, Appl. Phys. Lett. 84, 3762-3864 (2004).
    • (2004) Appl. Phys. Lett , vol.84 , pp. 3762-3864
    • Gobby, Z.L.Y.1    J. Shields, A.2
  • 68
    • 0141771056 scopus 로고    scopus 로고
    • Secure quantum key distribution using squeezed states
    • D., Gottesman and J., Preskill, Secure quantum key distribution using squeezed states, Phys. Rev. A 63, 022-309 (2001).
    • (2001) Phys. Rev. A , vol.63 , pp. 022-309
    • Gottesman, D.1    Preskill, J.2
  • 69
    • 0037319628 scopus 로고    scopus 로고
    • Proof of security of quantum key distribution with two-way classical communications
    • D., Gottesman and H.-K., Lo, Proof of security of quantum key distribution with two-way classical communications, IEEE Trans. Inform. Theory 49, 457-475 (2003).
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 457-475
    • Gottesman, D.1    Lo, H.-K.2
  • 71
    • 0004086411 scopus 로고
    • United States Patent 2,632,058 (March 17
    • F., Gray, Pulse Code Communication, United States Patent 2,632,058 (March 17, 1953).
    • (1953) Pulse Code Communication
    • Gray, F.1
  • 74
    • 0037017198 scopus 로고    scopus 로고
    • Continuous variable quantum cryptography using coherent states
    • F., Grosshans and P., Grangier, Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett. 88, 057-902 (2002).
    • (2002) Phys. Rev. Lett , vol.88 , pp. 057-902
    • Grosshans, F.1    Grangier, P.2
  • 75
    • 0012895792 scopus 로고    scopus 로고
    • Reverse reconciliation protocols for quantum cryptography with continuous variables
    • quant-ph/0204127
    • F., Grosshans and P., Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables, ar Xiv e-print quant-ph/0204127 (2002).
    • (2002) Arxiv E-Print
    • Grosshans, F.1    Grangier, P.2
  • 77
    • 0037448569 scopus 로고    scopus 로고
    • Quantum key distribution using gaussian-modulated coherent states
    • F., Grosshans, G., Van Assche, J., Wenger et al., Quantum key distribution using Gaussian-modulated coherent states, Nature 421, 238-241 (2003).
    • (2003) Nature , vol.421 , pp. 238-241
    • Grosshans, F.1    Van Assche, G.2    Wenger, J.3
  • 78
    • 1442298919 scopus 로고    scopus 로고
    • Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable
    • F., Grosshans, J., Wenger, R., Brouri, N., J. Cerf and P., Grangier, Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable, Quantum Inf. Comput. 3, 535-552 (2003).
    • (2003) Quantum Inf. Comput , vol.3 , pp. 535-552
    • Grosshans, F.1    Wenger, J.2    Brouri, R.3    J. Cerf, N.4    Grangier, P.5
  • 79
    • 1442331338 scopus 로고    scopus 로고
    • Continuous-variable quantum cryptography is secure against non-gaussian attacks
    • F., Grosshans and N., J. Cerf, Continuous-variable quantum cryptography is secure against non-Gaussian attacks, Phys. Rev. Lett 92, 047-905 (2004).
    • (2004) Phys. Rev. Lett , vol.92 , pp. 047-905
    • Grosshans, F.1    J. Cerf, N.2
  • 80
    • 18144364030 scopus 로고    scopus 로고
    • Collective attacks and unconditional security in continuous variable quantum key distribution
    • F., Grosshans, Collective attacks and unconditional security in continuous variable quantum key distribution, Phys. Rev. Lett. 94, 020-504 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 020-504
    • Grosshans, F.1
  • 81
    • 1642383295 scopus 로고
    • An identity-based key-exchange protocol
    • Lecture Notes in Computer Science
    • C., G. Gönther, An identity-based key-exchange protocol, Advances in Cryptology – Eurocrypt.‘89, Lecture Notes in Computer Science, 29-37 (1989).
    • (1989) Advances in Cryptology – Eurocrypt , vol.89 , pp. 29-37
    • G. Gönther, C.1
  • 82
    • 4243332662 scopus 로고    scopus 로고
    • Quantum cryptography with squeezed states
    • M., Hillery, Quantum cryptography with squeezed states, Phys. Rev. A 61, 022-309 (2000).
    • (2000) Phys. Rev. A , vol.61 , pp. 022-309
    • Hillery, M.1
  • 83
    • 0031675590 scopus 로고    scopus 로고
    • The capacity of the quantum channel with general signal states
    • A., S. Holevo, The capacity of the quantum channel with general signal states, IEEE Trans. Inform. Theory 44, 269-273 (1998).
    • (1998) IEEE Trans. Inform. Theory , vol.44 , pp. 269-273
    • S. Holevo, A.1
  • 84
    • 84925199027 scopus 로고    scopus 로고
    • Horst Guörtz Institute for IT-Security and Institute for Applied Information Processing and Communications
    • Horst Guörtz Institute for IT-Security and Institute for Applied Information Processing and Communications, Fourth Conference on the Advanced Encryption Standard (AES) (2004).
    • (2004) Fourth Conference on the Advanced Encryption Standard (AES)
  • 85
    • 84938015047 scopus 로고
    • A method for the construction of minimum redundancy codes
    • D., A. Huffman, A method for the construction of minimum redundancy codes, Proc. IRE, 1098-1101 (1952).
    • (1952) Proc. IRE , pp. 1098-1101
    • A. Huffman, D.1
  • 86
    • 0345299154 scopus 로고    scopus 로고
    • Practical quantum cryptography for secure free-space communications
    • quant-ph/9905009
    • R., J. Hughes, W., T. Buttler, P., G. Kwiat et al., Practical quantum cryptography for secure free-space communications, ar Xiv e-print quant-ph/9905009 (1999).
    • (1999) Arxiv E-Print
    • J. Hughes, R.1    T. Buttler, W.2    G. Kwiat, P.3
  • 87
    • 0010758769 scopus 로고    scopus 로고
    • Practical free- space quantum key distribution over 10 km in daylight and at night
    • R., J. Hughes, J., E. Nordholt, D., Derkacs and C., G. Peterson, Practical free- space quantum key distribution over 10 km in daylight and at night, New J. Phys 4, 43 (2002).
    • (2002) New J. Phys , vol.4 , pp. 43
    • J. Hughes, R.1    E. Nordholt, J.2    Derkacs, D.3    G. Peterson, C.4
  • 88
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.-Y., Hwang, Quantum key distribution with high loss: toward global secure communication, Phys. Rev. Lett. 91, 057-901 (2003).
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057-901
    • Hwang, W.-Y.1
  • 89
    • 19744380987 scopus 로고    scopus 로고
    • Security of quantum key distribution with coherent states and homodyne detection
    • S., Iblisdir, G., Van Assche and N., J. Cerf, Security of quantum key distribution with coherent states and homodyne detection, Phys. Rev. Lett. 93, 170-502 (2004).
    • (2004) Phys. Rev. Lett , vol.93 , pp. 170-502
    • Iblisdir, S.1    Van Assche, G.2    J. Cerf, N.3
  • 90
    • 85032406765 scopus 로고    scopus 로고
    • TM, http://www.idquantique.com/(2005).
    • (2005) Tm
  • 91
    • 85032404963 scopus 로고    scopus 로고
    • TM, http://www.idquantique.com/(2005).
    • (2005) Tm
  • 93
    • 84925199024 scopus 로고
    • Scrambling and randomization
    • Lecture Notes in Computer Science
    • S., C. Kak, Scrambling and randomization, Advances in Cryptology – Crypto.’81, Lecture Notes in Computer Science, 59-63 (1981).
    • (1981) Advances in Cryptology – Crypto , vol.81 , pp. 59-63
    • C. Kak, S.1
  • 94
  • 96
  • 97
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Lecture Notes in Computer Science
    • P., Kocher, J., Jaffe and B., Jun, Differential power analysis, Advances in Cryptology – Crypto‘99, Lecture Notes in Computer Science, 388-397 (1999).
    • (1999) Advances in Cryptology – Crypto , vol.99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 104
    • 84991939136 scopus 로고
    • Lfsr-based hashing and authentication
    • Lecture Notes in Computer Science
    • H., Krawczyk, LFSR-based hashing and authentication, Advances in Cryptology – Crypto.‘94, Lecture Notes in Computer Science, 129-139 (1994).
    • (1994) Advances in Cryptology – Crypto , vol.94 , pp. 129-139
    • Krawczyk, H.1
  • 105
    • 0037015595 scopus 로고    scopus 로고
    • A step towards global key distribution
    • C., Kurtsiefer, P., Zarda, M., Halder et al., A step towards global key distribution, Nature 419, 450 (2002).
    • (2002) Nature , vol.419 , pp. 450
    • Kurtsiefer, C.1    Zarda, P.2    Halder, M.3
  • 106
    • 0021388021 scopus 로고
    • An introduction to arithmetic coding
    • G., G. Langdon, An introduction to arithmetic coding, IBM J. Res. Dev. 28, 135-149 (1984).
    • (1984) IBM J. Res. Dev , vol.28 , pp. 135-149
    • G. Langdon, G.1
  • 107
    • 0036810616 scopus 로고    scopus 로고
    • Compression of binary sources with side information at the decoder using ldpc codes
    • A., D. Liveris, Z., Xiong and C., N. Georghiades, Compression of binary sources with side information at the decoder using LDPC codes, IEEE Commun. Lett. 6, 440-442 (2002).
    • (2002) IEEE Commun. Lett , vol.6 , pp. 440-442
    • D. Liveris, A.1    Xiong, Z.2    N. Georghiades, C.3
  • 108
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • H.-K., Lo and H., F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, 2050-2056 (1999).
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    F. Chau, H.2
  • 109
    • 3042620599 scopus 로고    scopus 로고
    • Method for decoupling error correction from privacy amplification
    • H.-K., Lo, Method for decoupling error correction from privacy amplification, New J. Phys 5, 36 (2003).
    • (2003) New J. Phys , vol.5 , pp. 36
    • Lo, H.-K.1
  • 110
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K., Lo, X., Ma and K., Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94, 230-504 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230-504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 111
    • 28844440400 scopus 로고    scopus 로고
    • Controlling excess noise in fiber-optics continuous-variable quantum key distribution
    • R
    • J., Lodewyck, T., Debuisschert, R., Tualle-Brouri and P., Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Phys. Rev. A 72, 050-303(R) (2005).
    • (2005) Phys. Rev. A , vol.72 , pp. 050-303
    • Lodewyck, J.1    Debuisschert, T.2    Tualle-Brouri, R.3    Grangier, P.4
  • 112
    • 4043069313 scopus 로고    scopus 로고
    • Continuous variable quantum key distribution using polarization encoding and post selection
    • S., Lorenz, N., Korolkova and G., Leuchs, Continuous variable quantum key distribution using polarization encoding and post selection, Appl. Phys. B 79, 273-277 (2004).
    • (2004) Appl. Phys. B , vol.79 , pp. 273-277
    • Lorenz, S.1    Korolkova, N.2    Leuchs, G.3
  • 113
    • 85032411849 scopus 로고    scopus 로고
    • MagiQ Technologies, QPNTM, http://www.magiqtech.com/(2005).
    • (2005) QPNTM
  • 114
    • 38149074447 scopus 로고
    • The computational complexity of universal hash functions
    • Y., Mansour, N., Nisan and P., Tiwari, The computational complexity of universal hash functions, Theor. Comput. Sci. 107, 121-133 (1993).
    • (1993) Theor. Comput. Sci , vol.107 , pp. 121-133
    • Mansour, Y.1    Nisan, N.2    Tiwari, P.3
  • 115
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Lecture Notes in Computer Science
    • M., Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology - Eurocrypt‘93, Lecture Notes in Computer Science, 386-397 (1993).
    • (1993) Advances in Cryptology - Eurocrypt , vol.93 , pp. 386-397
    • Matsui, M.1
  • 116
    • 0038218542 scopus 로고
    • The first experimental cryptanalysis of the data encryption standard
    • Lecture Notes in Computer Science
    • M., Matsui, The first experimental cryptanalysis of the data encryption standard, Advances in Cryptology – Crypto.‘94, Lecture Notes in Computer Science, 1-11 (1994).
    • (1994) Advances in Cryptology – Crypto , vol.94 , pp. 1-11
    • Matsui, M.1
  • 117
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U., M. Maurer, Secret key agreement by public discussion from common information, Ie Ee Trans. Inform. Theory 39, 733-742 (1993).
    • (1993) Ieee Trans. Inform. Theory , vol.39 , pp. 733-742
    • M. Maurer, U.1
  • 118
    • 0345681331 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by not authenticated public discussion
    • Lecture Notes in Computer Science
    • U., Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology – Eurocrypt.‘97, Lecture Notes in Computer Science, 209-225 (1997).
    • (1997) Advances in Cryptology – Eurocrypt , vol.97 , pp. 209-225
    • Maurer, U.1
  • 120
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • U., M. Maurer and S., Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inform. Theory 45, 499-514 (1999).
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499-514
    • M. Maurer, U.1    Wolf, S.2
  • 121
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • U., M. Maurer, Authentication theory and hypothesis testing, IEEE Trans. Inform. Theory 46, 1350-1356 (2000).
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 1350-1356
    • M. Maurer, U.1
  • 122
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Lecture Notes in Computer Science
    • U., Maurer and S., Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science, 351-368 (2000).
    • (2000) Advances in Cryptology - Eurocrypt 2000 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 123
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels—part i: Definitions and a completeness result
    • U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness Result, IEEE Trans. Inform. Theory 49, 822-831 (2003).
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 124
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels—part ii: The simulatability condition
    • U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part II: the simulatability condition, IEEE Trans. Inform. Theory 49, 832-838 (2003).
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 125
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels—part iii: Privacy amplification
    • U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part III: privacy amplification, IEEE Trans. Inform. Theory 49, 839-851 (2003).
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 126
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D., Mayers, Unconditional security in quantum cryptography, J. ACM 48, 351-406 (2001).
    • (2001) J. ACM , vol.48 , pp. 351-406
    • Mayers, D.1
  • 128
    • 0038975723 scopus 로고    scopus 로고
    • Quantum cryptography over 23 km in installed under-lake telecom fibre
    • A., Muller, H., Zbinden and N., Gisin, Quantum cryptography over 23 km in installed under-lake telecom fibre, Europhys. Lett. 33, 335 (1996).
    • (1996) Europhys. Lett , vol.33 , pp. 335
    • Muller, A.1    Zbinden, H.2    Gisin, N.3
  • 130
    • 26844487465 scopus 로고    scopus 로고
    • Low-density parity-check matrices for coding of correlated sources
    • J., Muramatsu, T., Uyematsu and T., Wadayama, Low-density parity-check matrices for coding of correlated sources, IEEE Trans. Inform. Theory 51, 3645-3654 (2005).
    • (2005) IEEE Trans. Inform. Theory , vol.51 , pp. 3645-3654
    • Muramatsu, J.1    Uyematsu, T.2    Wadayama, T.3
  • 131
    • 84937413721 scopus 로고    scopus 로고
    • Essential algebraic structure within the aes
    • Lecture Notes in Computer Science
    • S., Murphy and M., J. Robshaw, Essential algebraic structure within the AES, Advances in Cryptology - Crypto 2002, Lecture Notes in Computer Science, 1-16 (2002).
    • (2002) Advances in Cryptology - Crypto 2002 , pp. 1-16
    • Murphy, S.1    J. Robshaw, M.2
  • 133
    • 18144424865 scopus 로고    scopus 로고
    • Security bounds for continuous variables quantum key distribution
    • M., Navascues and A., Acin, Security bounds for continuous variables quantum key distribution, Phys. Rev. Lett. 94, 020-505 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 020-505
    • Navascues, M.1    Acin, A.2
  • 134
    • 0042221863 scopus 로고    scopus 로고
    • Statistical confidentiality tests for a quantum transmission using continuous variables
    • P., Navez, Statistical confidentiality tests for a quantum transmission using continuous variables, Eur. Phys. J. D 18, 219-228 (2002).
    • (2002) Eur. Phys. J. D , vol.18 , pp. 219-228
    • Navez, P.1
  • 139
  • 141
    • 0004888588 scopus 로고
    • Iterating von neumann's procedure for extracting random bits
    • Y., Peres, Iterating von Neumann's procedure for extracting random bits, Annals of Statistics 20, 590-597 (1992).
    • (1992) Annals of Statistics , vol.20 , pp. 590-597
    • Peres, Y.1
  • 144
    • 0346688181 scopus 로고    scopus 로고
    • Continuous variable quantum cryptography
    • T., C. Ralph, Continuous variable quantum cryptography, Phys. Rev. A 61, 010-303 (2000).
    • (2000) Phys. Rev. A , vol.61 , pp. 010-303
    • C. Ralph, T.1
  • 145
    • 0032629108 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in trevisan's extractors
    • R., Raz, O., Reingold and S., Vadhan, Extracting all the randomness and reducing the error in Trevisan's extractors, Proc. Symp. Theory of Computing, 149-158 (1999).
    • (1999) Proc. Symp. Theory of Computing , pp. 149-158
    • Raz, R.1    Reingold, O.2    Vadhan, S.3
  • 146
    • 4243703966 scopus 로고    scopus 로고
    • Quantum cryptography with a predetermined key, using continuous-variable einstein-podolsky-rosen correlations
    • M., D. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Phys. Rev. A 62, 062-308 (2000).
    • (2000) Phys. Rev. A , vol.62 , pp. 062-308
    • D. Reid, M.1
  • 147
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • Lecture Notes in Computer Science
    • R., Renner and S., Wolf, New bounds in secret-key agreement: the gap between formation and secrecy extraction, Advances in Cryptology - Eurocrypt 2003, Lecture Notes in Computer Science, 562-577 (2003).
    • (2003) Advances in Cryptology - Eurocrypt 2003 , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 149
    • 0034652078 scopus 로고    scopus 로고
    • Fast and user-friendly quantum key distribution
    • G., Ribordy, J., Gautier, H., Zbinden and N., Gisin, Fast and user-friendly quantum key distribution, J. Mod. Opt. 47, 517-531 (2000).
    • (2000) J. Mod. Opt , vol.47 , pp. 517-531
    • Ribordy, G.1    Gautier, J.2    Zbinden, H.3    Gisin, N.4
  • 150
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R., L. Rivest, A., Shamir and L., M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21, 120-126 (1978).
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • L. Rivest, R.1    Shamir, A.2    M. Adleman, L.3
  • 153
    • 0003855464 scopus 로고
    • second edition, New York, John Wiley & Sons
    • B., Schneier, Applied Cryptography, second edition, New York, John Wiley & Sons (1995).
    • (1995) Applied Cryptography
    • Schneier, B.1
  • 154
    • 34250459760 scopus 로고
    • Schnelle multiplikation grofier zahlen
    • A., Schönhage and V., Strassen, Schnelle Multiplikation grofier Zahlen, Computing 7, 281-292 (1971).
    • (1971) Computing , vol.7 , pp. 281-292
    • Schönhage, A.1    Strassen, V.2
  • 155
    • 0000256895 scopus 로고
    • Schnelle multiplikation von polynomen uber korpern der charakteristik 2
    • A., Schönhage, Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2, Acta Inform. 7, 395-398 (1977).
    • (1977) Acta Inform , vol.7 , pp. 395-398
    • Schönhage, A.1
  • 156
    • 33748608655 scopus 로고
    • Quantum coding
    • B., Schumacher, Quantum coding, Phys. Rev. A 51, 2738-2747 (1995).
    • (1995) Phys. Rev. A , vol.51 , pp. 2738-2747
    • Schumacher, B.1
  • 157
    • 0000712477 scopus 로고    scopus 로고
    • Sending classical information via noisy quantum channels
    • B., Schumacher and M., D. Westmoreland, Sending classical information via noisy quantum channels, Phys. Rev. A 56, 131-138 (1997).
    • (1997) Phys. Rev. A , vol.56 , pp. 131-138
    • Schumacher, B.1    D. Westmoreland, M.2
  • 160
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C., E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27, 623-656 (1948).
    • (1948) Bell Syst. Tech. J , vol.27 , pp. 623-656
    • E. Shannon, C.1
  • 161
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C., E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656-715 (1949).
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • E. Shannon, C.1
  • 163
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the bb84 quantum key distribution protocol
    • P., W. Shor and J., Preskill, Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85, 441-444 (2000).
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441-444
    • W. Shor, P.1    Preskill, J.2
  • 164
    • 0037156920 scopus 로고    scopus 로고
    • Quantum key distribution with bright entangled beams
    • C., Silberhorn, N., Korolkova and G., Leuchs, Quantum key distribution with bright entangled beams, Phys. Rev. Lett. 88, 167-902 (2002).
    • (2002) Phys. Rev. Lett , vol.88 , pp. 167-902
    • Silberhorn, C.1    Korolkova, N.2    Leuchs, G.3
  • 165
    • 0038803456 scopus 로고    scopus 로고
    • Continuous variable quantum cryptography - beating the 3 db loss limit
    • C., Silberhorn, T., C. Ralph, N., Lütkenhaus and G., Leuchs, Continuous variable quantum cryptography - beating the 3 dB loss limit, Phys. Rev. Lett. 89, 167-901 (2002).
    • (2002) Phys. Rev. Lett , vol.89 , pp. 167-901
    • Silberhorn, C.1    C. Ralph, T.2    Lütkenhaus, N.3    Leuchs, G.4
  • 166
  • 167
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • D., Slepian and J., K. Wolf, Noiseless coding of correlated information sources, IEEE Trans. Inform. Theory 19, 471-480 (1973).
    • (1973) IEEE Trans. Inform. Theory , vol.19 , pp. 471-480
    • Slepian, D.1    K. Wolf, J.2
  • 168
    • 0007244732 scopus 로고    scopus 로고
    • Multiple particle interference and quantum error correction
    • A., Steane, Multiple particle interference and quantum error correction, Proc. R. Soc. London A 452, 2551-2577 (1996).
    • (1996) Proc. R. Soc. London A , vol.452 , pp. 2551-2577
    • Steane, A.1
  • 169
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D., R. Stinson, Universal hashing and authentication codes, Design. Code. Cryptogr. 4, 369-380 (1994).
    • (1994) Design. Code. Cryptogr , vol.4 , pp. 369-380
    • R. Stinson, D.1
  • 171
  • 172
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • L., Trevisan, Extractors and pseudorandom generators, J. ACM 48, 860-879 (2001).
    • (2001) J. ACM , vol.48 , pp. 860-879
    • Trevisan, L.1
  • 175
    • 26944463497 scopus 로고    scopus 로고
    • Secure coherent-state quantum key distribution protocols with efficient reconciliation
    • G., Van Assche, S., Iblisdir and N., J. Cerf, Secure coherent-state quantum key distribution protocols with efficient reconciliation, Phys. Rev. A 71, 052-304 (2005).
    • (2005) Phys. Rev. A , vol.71 , pp. 052-304
    • Van Assche, G.1    Iblisdir, S.2    J. Cerf, N.3
  • 176
    • 0000478762 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G., S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications, J. IEEE 55, 109-115 (1926).
    • (1926) J. IEEE , vol.55 , pp. 109-115
    • S. Vernam, G.1
  • 177
    • 0032680475 scopus 로고    scopus 로고
    • Multilevel codes: Theoretical concepts and practical design rules
    • U., Wachsmann, R., F. Fischer and J., B. Huber, Multilevel codes: theoretical concepts and practical design rules, IEEE Trans. Inform. Theory 45, 1361-1391 (1999).
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 1361-1391
    • Wachsmann, U.1    F. Fischer, R.2    B. Huber, J.3
  • 178
    • 0037180773 scopus 로고    scopus 로고
    • Quantum cryptography with a photon turnstile
    • E., Waks, K., Inoue, C., Santori et al., Quantum cryptography with a photon turnstile, Nature 420, 762 (2002).
    • (2002) Nature , vol.420 , pp. 762
    • Waks, E.1    Inoue, K.2    Santori, C.3
  • 181
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B., Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94, 230-503 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230-503
    • Wang, X.-B.1
  • 182
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M., N. Wegman and J., L. Carter, New hash functions and their use in authentication and set equality, J. Comput. Syst. Sci. 22, 265-279 (1981).
    • (1981) J. Comput. Syst. Sci , vol.22 , pp. 265-279
    • N. Wegman, M.1    L. Carter, J.2
  • 183
    • 84925199014 scopus 로고    scopus 로고
    • from MathWorld - a Wolfram web resource
    • E., W. Weisstein, Number Theoretic Transform, from Math World - a Wolfram web resource, http://mathworld.wolfram.com/NumberTheoreticTransform.html (2005).
    • (2005) Number Theoretic Transform
    • W. Weisstein, E.1
  • 184
    • 84925161759 scopus 로고    scopus 로고
    • from MathWorld - a Wolfram web resource
    • E., W. Weisstein, Gray Code, from Math World - a Wolfram web resource, http://mathworld.wolfram.com/GrayCode.html (2005).
    • (2005) Gray Code
    • W. Weisstein, E.1
  • 186
    • 0001998264 scopus 로고
    • Conjugate coding
    • S., Wiesner, Conjugate coding, Sigact News 15, 78-88 (1983).
    • (1983) Sigact News , vol.15 , pp. 78-88
    • Wiesner, S.1
  • 187
    • 0001467577 scopus 로고
    • The zero-error side information problem and chromatic numbers
    • H., S. Witsenhausen, The zero-error side information problem and chromatic numbers, IEEE Trans. Inform. Theory 22, 592-593 (1976).
    • (1976) IEEE Trans. Inform. Theory , vol.22 , pp. 592-593
    • S. Witsenhausen, H.1
  • 188
    • 84907077814 scopus 로고
    • Iterative decoding for multilevel codes using reliability information
    • T., Wörz and J., Hagenauer, Iterative decoding for multilevel codes using reliability information, Proc. IEEE Globecom Conference, 1779-1784 (1992).
    • (1992) Proc. IEEE Globecom Conference , pp. 1779-1784
    • Wörz, T.1    Hagenauer, J.2
  • 189
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A., D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54, 1355-1387 (1975).
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • D. Wyner, A.1
  • 191
    • 0031098826 scopus 로고    scopus 로고
    • Interferometry with faraday mirrors for quantum cryptography
    • H., Zbinden, J., Gautier, N., Gisin et al., Interferometry with Faraday mirrors for quantum cryptography, Electron. Lett. 33, 586-588 (1997).
    • (1997) Electron. Lett , vol.33 , pp. 586-588
    • Zbinden, H.1    Gautier, J.2    Gisin, N.3
  • 193
    • 0035000235 scopus 로고    scopus 로고
    • Optimal code design for lossless and near lossless source coding in multiple access networks
    • Q., Zhao and M., Effros, Optimal code design for lossless and near lossless source coding in multiple access networks, Proc. IEEE Data Compression Conf. (DCC), 263-272 (2001).
    • (2001) Proc. IEEE Data Compression Conf. (DCC) , pp. 263-272
    • Zhao, Q.1    Effros, M.2
  • 195
    • 84942245925 scopus 로고    scopus 로고
    • Low complexity code design for lossless and near- lossless side information source codes
    • Q., Zhao and M., Effros, Low complexity code design for lossless and near- lossless side information source codes, Proc. IEEE Data Compression Conf. (DCC) (2003).
    • (2003) Proc. IEEE Data Compression Conf. (DCC)
    • Zhao, Q.1    Effros, M.2
  • 196
    • 0037271940 scopus 로고    scopus 로고
    • Lossless and near-lossless source coding for multiple access networks
    • Q., Zhao and M., Effros, Lossless and near-lossless source coding for multiple access networks, IEEE Trans. Inform. Theory 49, 112-128 (2003).
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 112-128
    • Zhao, Q.1    Effros, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.