메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 482-500

Linking classical and quantum key agreement: Is there “Bound information”?

Author keywords

Entanglement; Intrinsic information; Purification; Quantum privacy amplification; Secret key agreement; Secret key rate

Indexed keywords

CRYPTOGRAPHY; PURIFICATION;

EID: 84974621399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_30     Document Type: Conference Paper
Times cited : (65)

References (31)
  • 1
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
    • H. Bechmann-Pasquinucci and N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Phys. Rev. A, Vol. 59, No. 6, pp. 4238-4248, 1999.
    • (1999) Phys. Rev. A , vol.59 , Issue.6 , pp. 4238-4248
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 4
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., Vol. 81, No. 14, pp. 3018-3021, 1998.
    • (1998) Phys. Rev. Lett. , vol.81 , Issue.14 , pp. 3018-3021
    • Bruss, D.1
  • 5
    • 0038465444 scopus 로고    scopus 로고
    • Quantum copying: Beyond the no-cloning theorem
    • V. Bužek and M. Hillery, Quantum copying: beyond the no-cloning theorem, Phys. Rev. A, Vol. 54, pp. 1844-1852, 1996.
    • (1996) Phys. Rev. A , vol.54 , pp. 1844-1852
    • Bužek, V.1    Hillery, M.2
  • 6
    • 36049056258 scopus 로고
    • Proposed experiment to test local hidden-variable theories
    • J. F. Clauser, M. A. Horne, A. Shimony and R. A. Holt, Proposed experiment to test local hidden-variable theories, Phys. Rev. Lett., Vol. 23, pp. 880-884, 1969.
    • (1969) Phys. Rev. Lett. , vol.23 , pp. 880-884
    • Clauser, J.F.1    Horne, M.A.2    Shimony, A.3    Holt, R.A.4
  • 8
    • 6144265213 scopus 로고    scopus 로고
    • Quantum privacy amplification and the security of quantum cryptography over noisy channels
    • D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, Quantum privacy amplification and the security of quantum cryptography over noisy channels, Phys. Rev. Lett., Vol. 77, pp. 2818-2821, 1996.
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 2818-2821
    • Deutsch, D.1    Ekert, A.2    Jozsa, R.3    Macchiavello, C.4    Popescu, S.5    Sanpera, A.6
  • 10
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell’s theorem
    • See also Physics World, March 1998
    • A. E. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett., Vol. 67, pp. 661-663, 1991. See also Physics World, March 1998.
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661-663
    • Ekert, A.E.1
  • 11
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography-I: Information bound and optimal strategy
    • C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu, and A. Peres, Optimal eavesdropping in quantum cryptography-I: information bound and optimal strategy, Phys. Rev. A, Vol. 56, pp. 1163-1172, 1997.
    • (1997) Phys. Rev. A , vol.56 , pp. 1163-1172
    • Fuchs, C.1    Gisin, N.2    Griffiths, R.B.3    Niu, C.S.4    Peres, A.5
  • 12
    • 0000523928 scopus 로고
    • Stochastic quantum dynamics and relativity
    • N. Gisin, Stochastic quantum dynamics and relativity, Helv. Phys. Acta, Vol. 62, pp. 363-371, 1989.
    • (1989) Helv. Phys. Acta , vol.62 , pp. 363-371
    • Gisin, N.1
  • 13
    • 0042735997 scopus 로고    scopus 로고
    • Quantum cloning, eavesdropping, and Bell inequality
    • N. Gisin and B. Huttner, Quantum cloning, eavesdropping, and Bell inequality, Phys. Lett. A, Vol. 228, pp. 13-21, 1997.
    • (1997) Phys. Lett. A , vol.228 , pp. 13-21
    • Gisin, N.1    Huttner, B.2
  • 14
    • 0001554545 scopus 로고    scopus 로고
    • Optimal quantum cloning machines
    • N. Gisin and S. Massar, Optimal quantum cloning machines, Phys. Rev. Lett., Vol. 79, pp. 2153-2156, 1997.
    • (1997) Phys. Rev. Lett. , vol.79 , pp. 2153-2156
    • Gisin, N.1    Massar, S.2
  • 15
    • 0000324562 scopus 로고    scopus 로고
    • Quantum cryptography on noisy channels: Quantum versus classical key agreement protocols
    • N. Gisin and S. Wolf, Quantum cryptography on noisy channels: quantum versus classical key agreement protocols, Phys. Rev. Lett., Vol. 83, pp. 4200-4203, 1999.
    • (1999) Phys. Rev. Lett. , vol.83 , pp. 4200-4203
    • Gisin, N.1    Wolf, S.2
  • 16
    • 0008001217 scopus 로고    scopus 로고
    • Mixed-state entanglement and distillation: Is there a “bound” entanglement in nature?
    • M. Horodecki, P. Horodecki, and R. Horodecki, Mixed-state entanglement and distillation: is there a “bound” entanglement in nature?, Phys. Rev. Lett., Vol. 80, pp. 5239-5242, 1998.
    • (1998) Phys. Rev. Lett. , vol.80 , pp. 5239-5242
    • Horodecki, M.1    Horodecki, P.2    Horodecki, R.3
  • 17
    • 0042542909 scopus 로고    scopus 로고
    • Separability criterion and inseparable mixed states with positive partial transposition
    • P. Horodecki, Separability criterion and inseparable mixed states with positive partial transposition, Phys. Lett. A, Vol. 232, p. 333, 1997.
    • (1997) Phys. Lett. A , vol.232 , pp. 333
    • Horodecki, P.1
  • 18
    • 0000239556 scopus 로고    scopus 로고
    • Bound entanglement can be activated
    • quant-ph/9806058
    • P. Horodecki, M. Horodecki, and R. Horodecki, Bound entanglement can be activated, Phys. Rev. Lett., Vol. 82, pp. 1056-1059, 1999. quant-ph/9806058.
    • (1999) Phys. Rev. Lett , vol.82 , pp. 1056-1059
    • Horodecki, P.1    Horodecki, M.2    Horodecki, R.3
  • 19
    • 0001992982 scopus 로고
    • A complete classification of quantum ensembles having a given density matrix
    • L. P. Hughston, R. Jozsa, and W. K. Wootters, A complete classification of quantum ensembles having a given density matrix, Phys. Lett. A, Vol. 183, pp. 14-18, 1993.
    • (1993) Phys. Lett. A , vol.183 , pp. 14-18
    • Hughston, L.P.1    Jozsa, R.2    Wootters, W.K.3
  • 20
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, Vol. 39, No. 3, pp. 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 21
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag
    • U. Maurer and S. Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, pp. 352-368, Springer-Verlag, 2000.
    • (2000) Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science , vol.1807 , pp. 352-368
    • Maurer, U.1    Wolf, S.2
  • 22
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • U. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, Vol. 45, No. 2, pp. 499-514, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.1    Wolf, S.2
  • 23
    • 0032207846 scopus 로고    scopus 로고
    • The Ithaca interpretation of quantum mechanics
    • N. D. Mermin, The Ithaca interpretation of quantum mechanics, Pramana, Vol. 51, pp. 549-565, 1998.
    • (1998) Pramana , vol.51 , pp. 549-565
    • Mermin, N.D.1
  • 25
    • 0037574296 scopus 로고    scopus 로고
    • Separability criterion for density matrices
    • A. Peres, Separability criterion for density matrices, Phys. Rev. Lett., Vol. 77, pp. 1413-1415, 1996.
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 1413-1415
    • Peres, A.1
  • 28
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 30
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.