메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 289-299

Security aspects of practical quantum cryptography

Author keywords

[No Author keywords available]

Indexed keywords

QUBITS;

EID: 84948972108     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_20     Document Type: Conference Paper
Times cited : (27)

References (32)
  • 1
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • 25 May
    • C.H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, no. 21, 25 May 1992, pp. 3121-3124.
    • (1992) Physical Review Letters , vol.68 , Issue.21 , pp. 3121-3124
    • Bennett, C.H.1
  • 8
    • 0031273993 scopus 로고    scopus 로고
    • Bounds on information and the security of quantum cryptography
    • 17 November
    • E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography”, Physical Review Letters, Vol. 79, no. 20, 17 November 1997, pp. 4034-4037.
    • (1997) Physical Review Letters , vol.79 , Issue.20 , pp. 4034-4037
    • Biham, E.1    Mor, T.2
  • 9
    • 0000439908 scopus 로고
    • Continuum fields in quantum optics
    • K. J. Blow, R. Loudon, S. J. D. Phoenix and T. J. Sheperd, “Continuum fields in quantum optics”, Physical Review A, Vol. 42, no. 7, October 1990, pp. 4102-4114.
    • (1990) Physical Review A , vol.42 , Issue.7 , pp. 4102-4114
    • Blow, K.J.1    Loudon, R.2    Phoenix, S.J.3    Sheperd, T.J.4
  • 10
    • 33749582609 scopus 로고    scopus 로고
    • Quantum cryptography via parametric downconversion
    • P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York
    • G. Brassard, T. Mor and B.C. Sanders, “Quantum cryptography via parametric downconversion”, in Quantum Communication, Computing, and Measurement 2, P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 381-386.
    • (2000) Quantum Communication, Computing, and Measurement 2 , pp. 381-386
    • Brassard, G.1    Mor, T.2    Sanders, B.C.3
  • 12
    • 0001635114 scopus 로고
    • Practical quantum cryptography based on two-photon interferometry
    • 31 August
    • A.K. Ekert, J. G. Rarity, P.R. Tapster and G.M. Palma, “Practical quantum cryptography based on two-photon interferometry”, Physical Review Letters, Vol. 69, no. 9, 31 August 1992, pp. 1293-1295.
    • (1992) Physical Review Letters , vol.69 , Issue.9 , pp. 1293-1295
    • Ekert, A.K.1    Rarity, J.G.2    Tapster, P.R.3    Palma, G.M.4
  • 13
    • 0005246354 scopus 로고
    • Quantum cryptography using polarization feedback
    • J. D. Franson and H. Ilves, “Quantum cryptography using polarization feedback”, Journal of Modern Optics, Vol. 41, no. 12, December 1994, pp. 2391-2396.
    • (1994) Journal of Modern Optics , vol.41 , Issue.12 , pp. 2391-2396
    • Franson, J.D.1    Ilves, H.2
  • 14
    • 77956946118 scopus 로고    scopus 로고
    • Quantum phenomena in optical interferometry
    • P. Hariharan and B.C. Sanders, “Quantum phenomena in optical interferometry”, Progress in Optics, Vol. XXXVI, 1996, pp. 49-128.
    • (1996) Progress in Optics , vol.36 , pp. 49-128
    • Hariharan, P.1    Sanders, B.C.2
  • 15
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • B. Huttner, N. Imoto, N. Gisin and T. Mor, “Quantum cryptography with coherent states”, Physical Review A, Vol. 51, no. 3, March 1995, pp. 1863-1869.
    • (1995) Physical Review A , vol.51 , Issue.3 , pp. 1863-1869
    • Huttner, B.1    Imoto, N.2    Gisin, N.3    Mor, T.4
  • 16
    • 84923199214 scopus 로고
    • Comparison of quantum and semiclassical radiation theories with application to the beam maser
    • E. T. Jaynes and F.W. Cummings, “Comparison of quantum and semiclassical radiation theories with application to the beam maser”, Proceedings of the IEEE, Vol. 51, 1963, pp. 89-109.
    • (1963) Proceedings of the IEEE , vol.51 , pp. 89-109
    • Jaynes, E.T.1    Cummings, F.W.2
  • 17
    • 0033545306 scopus 로고    scopus 로고
    • A single-photon turnstile device
    • J. Kim, O. Benson, H. Kan and Y. Yamamoto, “A single-photon turnstile device”, Nature, Vol. 397, no. 6719, 1999, pp. 500-503.
    • (1999) Nature , vol.397 , Issue.6719 , pp. 500-503
    • Kim, J.1    Benson, O.2    Kan, H.3    Yamamoto, Y.4
  • 18
    • 84948956833 scopus 로고    scopus 로고
    • Dim coherent states as signal states in the BB84 protocol: Is it secure?
    • P.Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York
    • N. Lütkenhaus, “Dim coherent states as signal states in the BB84 protocol: Is it secure?”, in Quantum Communication, Computing, and Measurement 2, P.Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 387-392.
    • (2000) Quantum Communication, Computing, and Measurement 2 , pp. 387-392
    • Lütkenhaus, N.1
  • 19
    • 0040163388 scopus 로고    scopus 로고
    • Security of quantum cryptography with realistic sources
    • N. Lütkenhaus, “Security of quantum cryptography with realistic sources”, Acta Physica Slovaca, Vol. 49, 1999, pp. 549-556.
    • (1999) Acta Physica Slovaca , vol.49 , pp. 549-556
    • Lütkenhaus, N.1
  • 20
    • 84949006382 scopus 로고    scopus 로고
    • Security against individual attacks for realistic quantum key distribution
    • October
    • N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution”, Los Alamos archives quant-ph/9910093, October 1999.
    • (1999) Los Alamos Archives Quant-Ph/9910093
    • Lütkenhaus, N.1
  • 21
    • 0029357908 scopus 로고
    • Quantum key distribution over distances as long as 30 km
    • August
    • C. Marand and P. D. Townsend, “Quantum key distribution over distances as long as 30 km”, Optics Letters, Vol. 20, 15 August 1995, pp. 1695-1697.
    • (1995) Optics Letters , vol.20 , Issue.15 , pp. 1695-1697
    • Marand, C.1    Townsend, P.D.2
  • 23
    • 84949006383 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • February
    • D. Mayers, “Unconditional security in quantum cryptography”, Los Alamos archives quant-ph/9802025, February 1998.
    • (1998) Los Alamos Archives Quant-Ph/9802025
    • Mayers, D.1
  • 24
    • 33749571784 scopus 로고    scopus 로고
    • Ph.D. Thesis, Technion, Haifa, Los Alamos archives quant-ph/9906073
    • T. Mor, “Quantum memory in quantum cryptography”, Ph.D. Thesis, Technion, Haifa, 1997; Los Alamos archives quant-ph/9906073.
    • (1997) "Quantum Memory in Quantum Cryptography"
    • Mor, T.1
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, no. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 28
    • 0346933103 scopus 로고    scopus 로고
    • Quantum cryptography using femtosecond-pulsed parametric down-conversion
    • A.V. Sergienko, M. Atatüre, Z. Walton, G. Jaeger, B. E.A. Saleh and M.C. Teich, “Quantum cryptography using femtosecond-pulsed parametric down-conversion”, Physical Review A, Vol. 60, no. 4, October 1999, pp. R2622-R2625.
    • (1999) Physical Review A , vol.60 , Issue.4 , pp. 2622-2625
    • Sergienko, A.V.1    Atatüre, M.2    Walton, Z.3    Jaeger, G.4    Saleh, B.5    Teich, M.C.6
  • 29
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P.W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM Journal on Computing, Vol. 26, no. 5, 1997, pp. 1484-1509.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 30
    • 0032121772 scopus 로고    scopus 로고
    • Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems
    • P. D. Townsend, “Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems”, IEEE Photonics Technology Letters, Vol. 10, 1998, pp. 1048-1050.
    • (1998) IEEE Photonics Technology Letters , vol.10 , pp. 1048-1050
    • Townsend, P.D.1
  • 32
    • 0001020515 scopus 로고    scopus 로고
    • Quantum amplifiers, quantum duplicators and quantum cryptography
    • H.P. Yuen, “Quantum amplifiers, quantum duplicators and quantum cryptography”, Quantum and Semiclassical Optics, Vol. 8, 1996, pp. 939-949.
    • (1996) Quantum and Semiclassical Optics , vol.8 , pp. 939-949
    • Yuen, H.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.