메뉴 건너뛰기




Volumn 49, Issue C, 2006, Pages 381-454

Quantum cryptography

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85016162583     PISSN: 00796638     EISSN: None     Source Type: Book Series    
DOI: 10.1016/S0079-6638(06)49005-3     Document Type: Chapter
Times cited : (157)

References (182)
  • 1
    • 18144378105 scopus 로고    scopus 로고
    • Quantum correlations and secret bits
    • A. Acín N. Gisin Quantum correlations and secret bits Phys. Rev. Lett. 94 2005 020501
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 020501
    • Acín, A.1    Gisin, N.2
  • 2
    • 85120221476 scopus 로고    scopus 로고
    • AES (Advanced Encryption Standard), available at: http://www.nist.gov/aes
  • 4
    • 1842729194 scopus 로고    scopus 로고
    • Long-distance quantum communication with entangled photons using satellites
    • M. Aspelmeyer T. Jennewein A. Zeilinger M. Pfennigbauer W. Leeb Long-distance quantum communication with entangled photons using satellites Los Alamos e-print archive: quant-ph/0305105 2003
    • (2003)
    • Aspelmeyer, M.1    Jennewein, T.2    Zeilinger, A.3    Pfennigbauer, M.4    Leeb, W.5
  • 6
    • 0001293325 scopus 로고    scopus 로고
    • Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
    • H. Bechmann-Pasquinucci N. Gisin Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography Phys. Rev. A 59 1999 4238
    • (1999) Phys. Rev. A , vol.59 , pp. 4238
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 7
    • 0000486090 scopus 로고
    • On the Einstein–Podolsky–Rosen paradox
    • J.S. Bell On the Einstein–Podolsky–Rosen paradox Physics 1 1964 195
    • (1964) Physics , vol.1 , pp. 195
    • Bell, J.S.1
  • 8
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C.H. Bennett Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 1992 3121
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121
    • Bennett, C.H.1
  • 10
    • 0003259517 scopus 로고
    • Quantum cryptography: Public key distribution and coin tossing
    • C.H. Bennett G. Brassard Quantum cryptography: Public key distribution and coin tossing Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing Bangalore, India 1984 IEEE Press New York 175
    • (1984) , pp. 175
    • Bennett, C.H.1    Brassard, G.2
  • 11
    • 0003072918 scopus 로고
    • The dawn of a new era for quantum cryptography: The experimental prototype is working!
    • C.H. Bennett G. Brassard The dawn of a new era for quantum cryptography: The experimental prototype is working! Sigact News 20 4 1989 78
    • (1989) Sigact News , vol.20 , Issue.4 , pp. 78
    • Bennett, C.H.1    Brassard, G.2
  • 18
    • 19844368427 scopus 로고    scopus 로고
    • The universal composable security of quantum key distribution
    • M. Ben-Or M. Horodecki D.W. Leung D. Mayers J. Oppenheim The universal composable security of quantum key distribution Los Alamos e-print archive: quant-ph/0409078 2004
    • (2004)
    • Ben-Or, M.1    Horodecki, M.2    Leung, D.W.3    Mayers, D.4    Oppenheim, J.5
  • 19
    • 0033907404 scopus 로고    scopus 로고
    • An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light
    • D. Bethune W. Risk An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light IEEE J. Quantum Electron. 36 2000 340
    • (2000) IEEE J. Quantum Electron. , vol.36 , pp. 340
    • Bethune, D.1    Risk, W.2
  • 25
    • 28844482905 scopus 로고    scopus 로고
    • Security of two quantum cryptography protocols using the same four qubit states
    • C. Branciard N. Gisin B. Kraus V. Scarani Security of two quantum cryptography protocols using the same four qubit states Phys. Rev. A 72 2005 032301
    • (2005) Phys. Rev. A , vol.72 , pp. 032301
    • Branciard, C.1    Gisin, N.2    Kraus, B.3    Scarani, V.4
  • 27
    • 0001598288 scopus 로고
    • Secret-key reconciliation by public discussion
    • G. Brassard L. Salvail Secret-key reconciliation by public discussion Advances in Cryptology – Proceedings of Eurocrypt'93 1993 Springer-Verlag Berlin 410
    • (1993) , pp. 410
    • Brassard, G.1    Salvail, L.2
  • 28
    • 84855253103 scopus 로고
    • Quantum cryptography with polarized photons in optical fibers: Experimental and practical limits
    • J. Bréguet A. Müller N. Gisin Quantum cryptography with polarized photons in optical fibers: Experimental and practical limits J. Mod. Opt. 41 1994 2405
    • (1994) J. Mod. Opt. , vol.41 , pp. 2405
    • Bréguet, J.1    Müller, A.2    Gisin, N.3
  • 29
    • 0032621435 scopus 로고    scopus 로고
    • Pulsed energy–time entangled twin-photon source for quantum communication
    • J. Brendel N. Gisin W. Tittel H. Zbinden Pulsed energy–time entangled twin-photon source for quantum communication Phys. Rev. Lett. 82 1999 2594
    • (1999) Phys. Rev. Lett. , vol.82 , pp. 2594
    • Brendel, J.1    Gisin, N.2    Tittel, W.3    Zbinden, H.4
  • 30
    • 0001629129 scopus 로고    scopus 로고
    • Photon antibunching in the fluorescence of individual color centers in diamond
    • R. Brouri A. Beveratos J.-P. Poizat P. Grangier Photon antibunching in the fluorescence of individual color centers in diamond Opt. Lett. 25 2000 1294
    • (2000) Opt. Lett. , vol.25 , pp. 1294
    • Brouri, R.1    Beveratos, A.2    Poizat, J.-P.3    Grangier, P.4
  • 31
    • 0001063880 scopus 로고    scopus 로고
    • Triggered source of single photons based on controlled single molecule fluorescence
    • C. Brunel B. Lounis P. Tamarat M. Orrit Triggered source of single photons based on controlled single molecule fluorescence Phys. Rev. Lett. 83 1999 2722
    • (1999) Phys. Rev. Lett. , vol.83 , pp. 2722
    • Brunel, C.1    Lounis, B.2    Tamarat, P.3    Orrit, M.4
  • 32
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss Optimal eavesdropping in quantum cryptography with six states Phys. Rev. Lett. 81 1998 3018
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018
    • Bruss, D.1
  • 33
    • 0036375483 scopus 로고    scopus 로고
    • Characterizing entanglement
    • D. Bruss Characterizing entanglement J. Math. Phys. 43 2002 4237
    • (2002) J. Math. Phys. , vol.43 , pp. 4237
    • Bruss, D.1
  • 37
    • 0038465444 scopus 로고    scopus 로고
    • Quantum copying: Beyond the no-cloning theorem
    • V. Bužek M. Hillery Quantum copying: Beyond the no-cloning theorem Phys. Rev. A 54 1996 1844
    • (1996) Phys. Rev. A , vol.54 , pp. 1844
    • Bužek, V.1    Hillery, M.2
  • 38
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • C. Cachin U.M. Maurer Linking information reconciliation and privacy amplification J. Cryptology 10 1997 97
    • (1997) J. Cryptology , vol.10 , pp. 97
    • Cachin, C.1    Maurer, U.M.2
  • 39
    • 0001398327 scopus 로고    scopus 로고
    • Good quantum error-correcting codes exist
    • A.R. Calderbank P.W. Shor Good quantum error-correcting codes exist Phys. Rev. A 54 1996 1098
    • (1996) Phys. Rev. A , vol.54 , pp. 1098
    • Calderbank, A.R.1    Shor, P.W.2
  • 40
    • 0036997507 scopus 로고    scopus 로고
    • Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
    • H.F. Chau Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate Phys. Rev. A 66 2002 60302
    • (2002) Phys. Rev. A , vol.66 , pp. 60302
    • Chau, H.F.1
  • 41
    • 5044244087 scopus 로고    scopus 로고
    • On intrinsic information
    • M. Christandl R. Renner On intrinsic information Proceedings of the 2004 IEEE International Symposium on Information Theory 2004 IEEE Press 135
    • (2004) , pp. 135
    • Christandl, M.1    Renner, R.2
  • 43
    • 0004188848 scopus 로고
    • Elements of Information Theory
    • T.C. Cover J.A. Thomas Elements of Information Theory 1991 Wiley New York
    • (1991)
    • Cover, T.C.1    Thomas, J.A.2
  • 44
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár J. Körner Broadcast channels with confidential messages IEEE Trans. Inf. Theory IT-24 1978 339
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , pp. 339
    • Csiszár, I.1    Körner, J.2
  • 45
    • 33344457494 scopus 로고    scopus 로고
    • Detecting two-party quantum correlations in quantum key distribution protocols
    • M. Curty O. Gühne M. Lewenstein N. Lütkenhaus Detecting two-party quantum correlations in quantum key distribution protocols Phys. Rev. A 71 2005 022306
    • (2005) Phys. Rev. A , vol.71 , pp. 022306
    • Curty, M.1    Gühne, O.2    Lewenstein, M.3    Lütkenhaus, N.4
  • 46
    • 3142519923 scopus 로고    scopus 로고
    • Entanglement as precondition for secure quantum key distribution
    • M. Curty M. Lewenstein N. Lütkenhaus Entanglement as precondition for secure quantum key distribution Phys. Rev. Lett. 92 2004 217903
    • (2004) Phys. Rev. Lett. , vol.92 , pp. 217903
    • Curty, M.1    Lewenstein, M.2    Lütkenhaus, N.3
  • 47
    • 24944559349 scopus 로고
    • Machine Cryptography and Modern Cryptanalysis
    • C.A. Deavours L. Kruh Machine Cryptography and Modern Cryptanalysis 1985 Artech House Dedham, MA
    • (1985)
    • Deavours, C.A.1    Kruh, L.2
  • 48
    • 85120211034 scopus 로고    scopus 로고
    • DES Cracker 1, http://www.distributed.net/index.html.en
  • 49
    • 85120191669 scopus 로고    scopus 로고
    • DES Cracker 2, http://www.eff.org/Privacy/Crypto/Crypto_misc/DESCracker
  • 50
    • 85120225728 scopus 로고    scopus 로고
    • Performance of various quantum key distribution systems using 1.55 μm up-conversion single-photon detectors
    • E. Diamanti H. Takesue T. Honjo K. Inoue Y. Yamamoto Performance of various quantum key distribution systems using 1.55 μm up-conversion single-photon detectors Los Alamos e-print archive: quant-ph/0506036 2005
    • (2005)
    • Diamanti, E.1    Takesue, H.2    Honjo, T.3    Inoue, K.4    Yamamoto, Y.5
  • 53
    • 0038587551 scopus 로고    scopus 로고
    • Generalized beam-splitting attack in quantum cryptography with dim coherent states
    • M. Dušek O. Haderka M. Hendrych Generalized beam-splitting attack in quantum cryptography with dim coherent states Opt. Commun. 169 1999 103
    • (1999) Opt. Commun. , vol.169 , pp. 103
    • Dušek, M.1    Haderka, O.2    Hendrych, M.3
  • 55
    • 0342844378 scopus 로고    scopus 로고
    • Unambiguous state discrimination in quantum cryptography with weak coherent states
    • M. Dušek M. Jahma N. Lütkenhaus Unambiguous state discrimination in quantum cryptography with weak coherent states Phys. Rev. A 62 2000 022306
    • (2000) Phys. Rev. A , vol.62 , pp. 022306
    • Dušek, M.1    Jahma, M.2    Lütkenhaus, N.3
  • 56
    • 33947385649 scopus 로고
    • Can quantum-mechanical description of physical reality be considered complete?
    • A. Einstein B. Podolsky N. Rosen Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47 1935 777
    • (1935) Phys. Rev. , vol.47 , pp. 777
    • Einstein, A.1    Podolsky, B.2    Rosen, N.3
  • 57
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. Ekert Quantum cryptography based on Bell's theorem Phys. Rev. Lett. 67 1991 661
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.1
  • 60
    • 0347748069 scopus 로고    scopus 로고
    • Nonclassical photon statistics in single-molecule fluorescence at room temperature
    • L. Fleury J.-M. Segura G. Zumofen B. Hecht U.P. Wild Nonclassical photon statistics in single-molecule fluorescence at room temperature Phys. Rev. Lett. 84 2000 1148
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 1148
    • Fleury, L.1    Segura, J.-M.2    Zumofen, G.3    Hecht, B.4    Wild, U.P.5
  • 61
    • 3442883654 scopus 로고
    • Bell inequality for position and time
    • J.D. Franson Bell inequality for position and time Phys. Rev. Lett. 62 1989 2205
    • (1989) Phys. Rev. Lett. , vol.62 , pp. 2205
    • Franson, J.D.1
  • 62
    • 0005246354 scopus 로고
    • Quantum cryptography using polarization feedback
    • J.D. Franson H. Ilves Quantum cryptography using polarization feedback J. Mod. Opt. 41 1994 2391
    • (1994) J. Mod. Opt. , vol.41 , pp. 2391
    • Franson, J.D.1    Ilves, H.2
  • 63
    • 0029632446 scopus 로고
    • Operational system for quantum cryptography
    • J.D. Franson B.C. Jacobs Operational system for quantum cryptography Electron. Lett. 31 1995 232
    • (1995) Electron. Lett. , vol.31 , pp. 232
    • Franson, J.D.1    Jacobs, B.C.2
  • 65
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
    • C. Fuchs N. Gisin R.B. Griffiths C.-S. Niu A. Peres Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy Phys. Rev. A 56 1997 1163
    • (1997) Phys. Rev. A , vol.56 , pp. 1163
    • Fuchs, C.1    Gisin, N.2    Griffiths, R.B.3    Niu, C.-S.4    Peres, A.5
  • 67
    • 0000870032 scopus 로고
    • Mathematical games. A new kind of cipher that would take millions of years to break
    • M. Gardner Mathematical games. A new kind of cipher that would take millions of years to break Sci. Am. 237 1977 120
    • (1977) Sci. Am. , vol.237 , pp. 120
    • Gardner, M.1
  • 71
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122km of standard telecom fiber
    • C. Gobby Z.L. Yuan A.J. Shields Quantum key distribution over 122 km of standard telecom fiber Appl. Phys. Lett. 84 2004 3762
    • (2004) Appl. Phys. Lett. , vol.84 , pp. 3762
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 72
    • 0035841905 scopus 로고    scopus 로고
    • Secure free-space key exchange to 1.9km and beyond
    • P.M. Gorman P.R. Tapster J.G. Rarity Secure free-space key exchange to 1.9 km and beyond J. Mod. Opt. 48 2001 1887
    • (2001) J. Mod. Opt. , vol.48 , pp. 1887
    • Gorman, P.M.1    Tapster, P.R.2    Rarity, J.G.3
  • 73
    • 0037319628 scopus 로고    scopus 로고
    • Proof of security of quantum key distribution with two-way classical communications
    • D. Gottesman H.-K. Lo Proof of security of quantum key distribution with two-way classical communications IEEE Trans. Inform. Theory 49 2003 457
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 457
    • Gottesman, D.1    Lo, H.-K.2
  • 75
    • 33746256615 scopus 로고
    • How to factor a number
    • R.K. Guy How to factor a number Proc. Fifth Manitoba Conf. Numer. Math., Congressus Numerantium XVI 1976 Univ. Manitoba 49
    • (1976) , pp. 49
    • Guy, R.K.1
  • 76
    • 85120209645 scopus 로고    scopus 로고
    • Homer, 8th c. B.C., Iliad 6.213, English transl. by Ian Johnston, 2000, Malaspina University-College, Nanaimo, BC, Canada
  • 77
    • 0003035113 scopus 로고
    • Experimental realization of a localized one-photon state
    • C.K. Hong L. Mandel Experimental realization of a localized one-photon state Phys. Rev. Lett. 56 1986 58
    • (1986) Phys. Rev. Lett. , vol.56 , pp. 58
    • Hong, C.K.1    Mandel, L.2
  • 78
    • 0042376719 scopus 로고    scopus 로고
    • Separability of mixed states: Necessary and sufficient conditions
    • M. Horodecki P. Horodecki R. Horodecki Separability of mixed states: Necessary and sufficient conditions Phys. Lett. A 223 1996 1
    • (1996) Phys. Lett. A , vol.223 , pp. 1
    • Horodecki, M.1    Horodecki, P.2    Horodecki, R.3
  • 84
    • 0034652057 scopus 로고    scopus 로고
    • Quantum key distribution over a 48-km optical fiber network
    • R. Hughes G. Morgan C. Peterson Quantum key distribution over a 48-km optical fiber network J. Mod. Opt. 47 2000 533
    • (2000) J. Mod. Opt. , vol.47 , pp. 533
    • Hughes, R.1    Morgan, G.2    Peterson, C.3
  • 85
    • 0010758769 scopus 로고    scopus 로고
    • Practical free-space quantum key distribution over 10km in daylight and at night
    • R.J. Hughes J.E. Nordholt D. Derkacs C.G. Peterson Practical free-space quantum key distribution over 10 km in daylight and at night New J. Phys. 4 2002 43
    • (2002) New J. Phys. , vol.4 , pp. 43
    • Hughes, R.J.1    Nordholt, J.E.2    Derkacs, D.3    Peterson, C.G.4
  • 86
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.-Y. Hwang Quantum key distribution with high loss: Toward global secure communication Phys. Rev. Lett. 91 2003 057901
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 87
    • 0013237387 scopus 로고    scopus 로고
    • Unconditional security of practical quantum key distribution
    • H. Inamori N. Lütkenhaus D. Mayers Unconditional security of practical quantum key distribution Los Alamos e-print archive: quant-ph/0107017 2001
    • (2001)
    • Inamori, H.1    Lütkenhaus, N.2    Mayers, D.3
  • 88
    • 0013056114 scopus 로고    scopus 로고
    • Quantum cryptography in free space
    • B.C. Jacobs J.D. Franson Quantum cryptography in free space Opt. Lett. 21 1996 1854
    • (1996) Opt. Lett. , vol.21 , pp. 1854
    • Jacobs, B.C.1    Franson, J.D.2
  • 90
    • 0003727003 scopus 로고
    • The Codebreakers: The Story of Secret Writing
    • D. Kahn The Codebreakers: The Story of Secret Writing 1967 Macmillan New York
    • (1967)
    • Kahn, D.1
  • 92
    • 0005586932 scopus 로고    scopus 로고
    • Development of a high-quantum-efficiency single-photon counting system
    • J. Kim S. Takeuchi Y. Yamamoto H. Hogue Development of a high-quantum-efficiency single-photon counting system Appl. Phys. Lett. 74 1999 902
    • (1999) Appl. Phys. Lett. , vol.74 , pp. 902
    • Kim, J.1    Takeuchi, S.2    Yamamoto, Y.3    Hogue, H.4
  • 93
    • 9144256950 scopus 로고    scopus 로고
    • Single-photon interference over 150-km transmission using silica-based integrated-optic interferometers for quantum cryptography
    • T. Kimura Y. Nambu T. Hatanaka A. Tomita H. Kosaka K. Nakamura Single-photon interference over 150-km transmission using silica-based integrated-optic interferometers for quantum cryptography Jpn. J. Appl. Phys. 43 2004 L1217
    • (2004) Jpn. J. Appl. Phys. , vol.43 , pp. L1217
    • Kimura, T.1    Nambu, Y.2    Hatanaka, T.3    Tomita, A.4    Kosaka, H.5    Nakamura, K.6
  • 94
    • 0032110830 scopus 로고    scopus 로고
    • Intensity fluctuation spectroscopy of small numbers of dye molecules in a microcavity
    • S.C. Kitson P. Jonsson J.G. Rarity P.R. Tapster Intensity fluctuation spectroscopy of small numbers of dye molecules in a microcavity Phys. Rev. A 58 1998 6620
    • (1998) Phys. Rev. A , vol.58 , pp. 6620
    • Kitson, S.C.1    Jonsson, P.2    Rarity, J.G.3    Tapster, P.R.4
  • 95
    • 19644377760 scopus 로고    scopus 로고
    • Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse
    • M. Koashi Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse Phys. Rev. Lett. 93 2004 120501
    • (2004) Phys. Rev. Lett. , vol.93 , pp. 120501
    • Koashi, M.1
  • 96
    • 0037026060 scopus 로고    scopus 로고
    • Deterministic single-photon source for distributed quantum networking
    • A. Kuhn M. Hennrich G. Rempe Deterministic single-photon source for distributed quantum networking Phys. Rev. Lett. 89 2002 067901
    • (2002) Phys. Rev. Lett. , vol.89 , pp. 067901
    • Kuhn, A.1    Hennrich, M.2    Rempe, G.3
  • 98
    • 6444245438 scopus 로고    scopus 로고
    • The breakdown flash of silicon avalanche photodiodes – back door for eavesdropper attacks?
    • C. Kurtsiefer P. Zarda S. Mayer H. Weinfurter The breakdown flash of silicon avalanche photodiodes – back door for eavesdropper attacks? J. Mod. Opt. 48 2001 2039
    • (2001) J. Mod. Opt. , vol.48 , pp. 2039
    • Kurtsiefer, C.1    Zarda, P.2    Mayer, S.3    Weinfurter, H.4
  • 99
    • 0036442647 scopus 로고    scopus 로고
    • Long distance free-space quantum cryptography
    • C. Kurtsiefer P. Zarda M. Halder P.M. Gorman P.R. Tapster J.G. Rarity H. Weinfurter Long distance free-space quantum cryptography S. Liu G. Guo H.-K. Lo N. Imoto Quantum Optics in Computing and Communications Proceedings SPIE vol. 4917 2002 SPIE Press Bellingham, WA 25
    • (2002) , pp. 25
    • Kurtsiefer, C.1    Zarda, P.2    Halder, M.3    Gorman, P.M.4    Tapster, P.R.5    Rarity, J.G.6    Weinfurter, H.7
  • 101
    • 0342492656 scopus 로고    scopus 로고
    • Cryptology in the 15th and 16th century
    • T.P. Leary Cryptology in the 15th and 16th century Cryptologia 20 3 1996 223
    • (1996) Cryptologia , vol.20 , Issue.3 , pp. 223
    • Leary, T.P.1
  • 102
    • 0013207242 scopus 로고    scopus 로고
    • Proof of unconditional security of six-state quantum key distribution scheme
    • H.-K. Lo Proof of unconditional security of six-state quantum key distribution scheme Quant. Inf. Comp. 1 2001 81
    • (2001) Quant. Inf. Comp. , vol.1 , pp. 81
    • Lo, H.-K.1
  • 103
    • 17444398022 scopus 로고    scopus 로고
    • Efficient quantum key distribution scheme and proof of its unconditional security
    • H.-K. Lo H.F. Chau M. Ardehali Efficient quantum key distribution scheme and proof of its unconditional security J. Cryptol. 18 2005 133
    • (2005) J. Cryptol. , vol.18 , pp. 133
    • Lo, H.-K.1    Chau, H.F.2    Ardehali, M.3
  • 104
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo X. Ma K. Chen Decoy state quantum key distribution Phys. Rev. Lett. 94 2005 230504
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 105
    • 0002136892 scopus 로고    scopus 로고
    • Security against eavesdropping in quantum cryptography
    • N. Lütkenhaus Security against eavesdropping in quantum cryptography Phys. Rev. A 54 1996 97
    • (1996) Phys. Rev. A , vol.54 , pp. 97
    • Lütkenhaus, N.1
  • 106
    • 0001619342 scopus 로고    scopus 로고
    • Estimates for practical quantum cryptography
    • N. Lütkenhaus Estimates for practical quantum cryptography Phys. Rev. A 59 1999 3301
    • (1999) Phys. Rev. A , vol.59 , pp. 3301
    • Lütkenhaus, N.1
  • 107
    • 0347111146 scopus 로고    scopus 로고
    • Security against individual attacks for realistic quantum key distribution
    • N. Lütkenhaus Security against individual attacks for realistic quantum key distribution Phys. Rev. A 61 2000 052304
    • (2000) Phys. Rev. A , vol.61 , pp. 052304
    • Lütkenhaus, N.1
  • 108
    • 85093468287 scopus 로고    scopus 로고
    • Security of quantum key distribution with realistic devices
    • X. Ma Security of quantum key distribution with realistic devices Los Alamos e-print archive: quant-ph/0503057 2004
    • (2004)
    • Ma, X.1
  • 109
    • 0029357908 scopus 로고
    • Quantum key distribution over distances as long as 30km
    • C. Marand P.D. Townsend Quantum key distribution over distances as long as 30 km Opt. Lett. 20 1995 1695
    • (1995) Opt. Lett. , vol.20 , pp. 1695
    • Marand, C.1    Townsend, P.D.2
  • 110
  • 111
    • 0024716272 scopus 로고
    • A universal compensator for polarization changes induced by birefringence on a retracing beam
    • M. Martinelli A universal compensator for polarization changes induced by birefringence on a retracing beam Opt. Commun. 72 1989 341
    • (1989) Opt. Commun. , vol.72 , pp. 341
    • Martinelli, M.1
  • 112
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer Secret key agreement by public discussion from common information IEEE Trans. Inform. Theory 39 1993 733
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733
    • Maurer, U.1
  • 113
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • U. Maurer S. Wolf Unconditionally secure key agreement and the intrinsic conditional information IEEE Trans. Inform. Theory 45 1999 499
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499
    • Maurer, U.1    Wolf, S.2
  • 114
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • D. Mayers Quantum key distribution and string oblivious transfer in noisy channels Advances in Cryptology – Proceedings of Crypto'96 1996 Springer-Verlag Berlin 343
    • (1996) , pp. 343
    • Mayers, D.1
  • 115
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers Unconditional security in quantum cryptography JACM 48 2001 351
    • (2001) JACM , vol.48 , pp. 351
    • Mayers, D.1
  • 116
    • 0032306873 scopus 로고    scopus 로고
    • Quantum cryptography with imperfect apparatus
    • D. Mayers A. Yao Quantum cryptography with imperfect apparatus Proceedings of the 39th Annual Symposium on Foundations of Computer Science 1998 IEEE Computer Society Los Alamitos, CA 503
    • (1998) , pp. 503
    • Mayers, D.1    Yao, A.2
  • 117
    • 0041511833 scopus 로고    scopus 로고
    • Demonstration of a low-noise near-infrared photon counter with multiphoton discrimination
    • A.J. Miller S.W. Nam J.M. Martinis A.V. Sergienko Demonstration of a low-noise near-infrared photon counter with multiphoton discrimination Appl. Phys. Lett. 83 2003 791
    • (2003) Appl. Phys. Lett. , vol.83 , pp. 791
    • Miller, A.J.1    Nam, S.W.2    Martinis, J.M.3    Sergienko, A.V.4
  • 118
    • 1642269047 scopus 로고    scopus 로고
    • Photon antibunching at high temperature from a single InGaAs/GaAs quantum dot
    • R.P. Mirin Photon antibunching at high temperature from a single InGaAs/GaAs quantum dot Appl. Phys. Lett. 84 2004 1260
    • (2004) Appl. Phys. Lett. , vol.84 , pp. 1260
    • Mirin, R.P.1
  • 120
    • 85120232582 scopus 로고    scopus 로고
    • Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors
    • T. Moroder M. Curty N. Lütkenhaus Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors Los Alamos e-print archive: quant-ph/0507235 2005
    • (2005)
    • Moroder, T.1    Curty, M.2    Lütkenhaus, N.3
  • 121
    • 84956073647 scopus 로고
    • Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1km
    • A. Müller J. Bréguet N. Gisin Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km Europhys. Lett. 23 1993 383
    • (1993) Europhys. Lett. , vol.23 , pp. 383
    • Müller, A.1    Bréguet, J.2    Gisin, N.3
  • 124
    • 0038975723 scopus 로고    scopus 로고
    • Quantum cryptography over 23km in installed under-lake telecom fibre
    • A. Müller H. Zbinden N. Gisin Quantum cryptography over 23 km in installed under-lake telecom fibre Europhys. Lett. 33 1996 335
    • (1996) Europhys. Lett. , vol.33 , pp. 335
    • Müller, A.1    Zbinden, H.2    Gisin, N.3
  • 125
    • 0000043416 scopus 로고    scopus 로고
    • Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
    • D. Naik C. Peterson A. White A. Berglund P. Kwiat Entangled state quantum cryptography: Eavesdropping on the Ekert protocol Phys. Rev. Lett. 84 2000 4733
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 4733
    • Naik, D.1    Peterson, C.2    White, A.3    Berglund, A.4    Kwiat, P.5
  • 126
    • 84861593360 scopus 로고    scopus 로고
    • Quantum Computation and Quantum Information
    • M.A. Nielsen I.L. Chuang Quantum Computation and Quantum Information 2000 Cambridge Univ. Press Cambridge
    • (2000)
    • Nielsen, M.A.1    Chuang, I.L.2
  • 128
    • 85120192676 scopus 로고    scopus 로고
    • NSA (The Venona Story) http://www.nsa.gov/publications/publi00036.pdf
  • 129
    • 85120218601 scopus 로고    scopus 로고
    • Old Spartan Facts, http://www.geocities.com/Athens/Aegean/7849/spfacts.html
  • 132
  • 134
    • 85120195339 scopus 로고    scopus 로고
    • Renner, R., 2005, Security of quantum key distribution, PhD thesis, ETH Zürich.
  • 137
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest A. Shamir L.M. Adleman A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 2 1978 120
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 138
    • 35248851207 scopus 로고    scopus 로고
    • Future cryptography: Standards are not enough
    • T. Rosa Future cryptography: Standards are not enough Proc. of Security and Protection of Information, NATO–IDET 2001 Military Academy in Brno Brno 237
    • (2001) , pp. 237
    • Rosa, T.1
  • 139
    • 26944463035 scopus 로고    scopus 로고
    • Noise-free high-efficiency photon-number-resolving detectors
    • D. Rosenberg A.E. Lita A.J. Miller S.W. Nam Noise-free high-efficiency photon-number-resolving detectors Phys. Rev. A 71 2005 061803(R)
    • (2005) Phys. Rev. A , vol.71 , pp. 061803(R)
    • Rosenberg, D.1    Lita, A.E.2    Miller, A.J.3    Nam, S.W.4
  • 141
    • 1642383816 scopus 로고    scopus 로고
    • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
    • V. Scarani A. Acín G. Ribordy N. Gisin Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations Phys. Rev. Lett. 92 2004 057901
    • (2004) Phys. Rev. Lett. , vol.92 , pp. 057901
    • Scarani, V.1    Acín, A.2    Ribordy, G.3    Gisin, N.4
  • 142
    • 84949482655 scopus 로고    scopus 로고
    • Factoring large numbers with the TWINKLE device
    • A. Shamir Factoring large numbers with the TWINKLE device Proceedings of CHES'99 Worcester, MA, USA Lect. Notes Comput. Sci. vol. 1717 1999 Springer-Verlag 2
    • (1999) , pp. 2
    • Shamir, A.1
  • 143
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon Communication theory of secrecy systems Bell Syst. Tech. J. 28 1949 656
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656
    • Shannon, C.E.1
  • 144
    • 0002642964 scopus 로고
    • Algorithms for quantum computation: Factoring and discrete logarithms
    • P.W. Shor Algorithms for quantum computation: Factoring and discrete logarithms S. Goldwasser Proc. 35th Annual Symposium on Foundations of Comp. Science 1994 IEEE Press Bellingham 124
    • (1994) , pp. 124
    • Shor, P.W.1
  • 145
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P.W. Shor J. Preskill Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 2000 441
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 146
    • 0003320305 scopus 로고    scopus 로고
    • A cost-based security analysis of symmetric and asymmetric key lengths
    • R.D. Silverman A cost-based security analysis of symmetric and asymmetric key lengths RSA Laboratories' Bulletin 13 April 2000 2000
    • (2000) RSA Laboratories' Bulletin , vol.13 , Issue.April 2000
    • Silverman, R.D.1
  • 147
    • 0000005686 scopus 로고    scopus 로고
    • Security of quantum cryptography against individual attacks
    • B. Slutsky R. Rao P.C. Sun Y. Fainman Security of quantum cryptography against individual attacks Phys. Rev. A 57 1998 2383
    • (1998) Phys. Rev. A , vol.57 , pp. 2383
    • Slutsky, B.1    Rao, R.2    Sun, P.C.3    Fainman, Y.4
  • 148
    • 4043092517 scopus 로고    scopus 로고
    • Error correcting codes in quantum theory
    • A.M. Steane Error correcting codes in quantum theory Phys. Rev. Lett. 77 1996 793
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 793
    • Steane, A.M.1
  • 149
    • 0003987443 scopus 로고
    • Cryptography, Theory and Practice
    • D.R. Stinson Cryptography, Theory and Practice 1995 CRC Press Boca Raton, FL
    • (1995)
    • Stinson, D.R.1
  • 151
    • 84862880316 scopus 로고    scopus 로고
    • Fast and simple one-way quantum key distribution
    • D. Stucki N. Brunner N. Gisin V. Scarani H. Zbinden Fast and simple one-way quantum key distribution Los Alamos e-print archive: quant-ph/0506097 2005
    • (2005)
    • Stucki, D.1    Brunner, N.2    Gisin, N.3    Scarani, V.4    Zbinden, H.5
  • 154
    • 2542436197 scopus 로고    scopus 로고
    • Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
    • K. Tamaki N. Lütkenhaus Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Phys. Rev. A 69 2004 032316
    • (2004) Phys. Rev. A , vol.69 , pp. 032316
    • Tamaki, K.1    Lütkenhaus, N.2
  • 155
    • 0038514019 scopus 로고    scopus 로고
    • Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel
    • K. Tamaki M. Koashi N. Imoto Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel Phys. Rev. A 67 2003 032310
    • (2003) Phys. Rev. A , vol.67 , pp. 032310
    • Tamaki, K.1    Koashi, M.2    Imoto, N.3
  • 156
    • 0037526588 scopus 로고    scopus 로고
    • Unconditionally secure key distribution based on two nonorthogonal states
    • K. Tamaki M. Koashi N. Imoto Unconditionally secure key distribution based on two nonorthogonal states Phys. Rev. Lett. 90 2003 167904
    • (2003) Phys. Rev. Lett. , vol.90 , pp. 167904
    • Tamaki, K.1    Koashi, M.2    Imoto, N.3
  • 158
    • 0000057408 scopus 로고    scopus 로고
    • Quantum cryptography using entangled photons in energy–time Bell states
    • W. Tittel J. Brendel H. Zbinden N. Gisin Quantum cryptography using entangled photons in energy–time Bell states Phys. Rev. Lett. 84 2000 4737
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 4737
    • Tittel, W.1    Brendel, J.2    Zbinden, H.3    Gisin, N.4
  • 159
    • 0028428439 scopus 로고
    • Secure key distribution system based on quantum cryptography
    • P. Townsend Secure key distribution system based on quantum cryptography Electron. Lett. 30 1994 809
    • (1994) Electron. Lett. , vol.30 , pp. 809
    • Townsend, P.1
  • 160
    • 0030822386 scopus 로고    scopus 로고
    • Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using WDM
    • P. Townsend Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using WDM Electron. Lett. 33 1997 188
    • (1997) Electron. Lett. , vol.33 , pp. 188
    • Townsend, P.1
  • 161
    • 0027580767 scopus 로고
    • Single photon interference in a 10km long optical fiber interferometer
    • P. Townsend J.G. Rarity P.R. Tapster Single photon interference in a 10 km long optical fiber interferometer Electron. Lett. 29 1993 634
    • (1993) Electron. Lett. , vol.29 , pp. 634
    • Townsend, P.1    Rarity, J.G.2    Tapster, P.R.3
  • 162
    • 0027912088 scopus 로고
    • Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography channel
    • P. Townsend J.G. Rarity P.R. Tapster Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography channel Electron. Lett. 29 1993 1291
    • (1993) Electron. Lett. , vol.29 , pp. 1291
    • Townsend, P.1    Rarity, J.G.2    Tapster, P.R.3
  • 167
    • 0000478762 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G.S. Vernam Cipher printing telegraph systems for secret wire and radio telegraphic communications J. AIEE 45 1926 109
    • (1926) J. AIEE , vol.45 , pp. 109
    • Vernam, G.S.1
  • 168
    • 0039189810 scopus 로고    scopus 로고
    • Compact all-solid-state source of polarization-entangled photon pairs
    • J. Volz C. Kurtsiefer H. Weinfurter Compact all-solid-state source of polarization-entangled photon pairs Appl. Phys. Lett. 79 2001 869
    • (2001) Appl. Phys. Lett. , vol.79 , pp. 869
    • Volz, J.1    Kurtsiefer, C.2    Weinfurter, H.3
  • 169
    • 17044414350 scopus 로고    scopus 로고
    • High efficiency photon number detection for quantum information processing
    • E. Waks K. Inoue W.D. Oliver E. Diamanti Y. Yamamoto High efficiency photon number detection for quantum information processing Los Alamos e-print archive: quant-ph/0308054 2003
    • (2003)
    • Waks, E.1    Inoue, K.2    Oliver, W.D.3    Diamanti, E.4    Yamamoto, Y.5
  • 171
    • 84889313674 scopus 로고    scopus 로고
    • Beating the pns attack in practical quantum cryptography
    • X.-B. Wang Beating the pns attack in practical quantum cryptography Los Alamos e-print archive: quant-ph/0410075 2004
    • (2004)
    • Wang, X.-B.1
  • 172
    • 23744442750 scopus 로고    scopus 로고
    • A decoy-state protocol for quantum cryptography with 4 intensities of coherent light
    • X.-B. Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent light Los Alamos e-print archive: quant-ph/0411047 2004
    • (2004)
    • Wang, X.-B.1
  • 173
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman J.L. Carter New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 1981 265
    • (1981) J. Comput. Syst. Sci. , vol.22 , pp. 265
    • Wegman, M.N.1    Carter, J.L.2
  • 174
    • 0003030518 scopus 로고    scopus 로고
    • Efficient DES key search – An update
    • M. Wiener Efficient DES key search – An update RSA Laboratories' Cryptobytes 3 2 1997 6
    • (1997) RSA Laboratories' Cryptobytes , vol.3 , Issue.2 , pp. 6
    • Wiener, M.1
  • 175
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner Conjugate coding Sigact News 15 1 1983 78
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78
    • Wiesner, S.1
  • 176
    • 33746708860 scopus 로고
    • A single quantum cannot be cloned
    • W.K. Wootters W.H. Zurek A single quantum cannot be cloned Nature 299 1982 802
    • (1982) Nature , vol.299 , pp. 802
    • Wootters, W.K.1    Zurek, W.H.2
  • 177
    • 13544277609 scopus 로고    scopus 로고
    • Continuous operation of a one-way quantum key distribution system over installed telecom fibre
    • Z.L. Yuan A.J. Shields Continuous operation of a one-way quantum key distribution system over installed telecom fibre Opt. Exp. 13 2005 660
    • (2005) Opt. Exp. , vol.13 , pp. 660
    • Yuan, Z.L.1    Shields, A.J.2
  • 180
    • 23744449651 scopus 로고    scopus 로고
    • Experimental decoy state quantum key distribution over 15km
    • Y. Zhao B. Qi X. Ma H.-K. Lo L. Qian Experimental decoy state quantum key distribution over 15 km Los Alamos e-print archive: quant-ph/0503192 2005
    • (2005)
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 181
    • 4043144235 scopus 로고
    • “Event-ready-detectors” Bell experiment via entanglement swapping
    • M. Żukowski A. Zeilinger M.A. Horne A. Ekert “Event-ready-detectors” Bell experiment via entanglement swapping Phys. Rev. Lett. 71 1993 4287
    • (1993) Phys. Rev. Lett. , vol.71 , pp. 4287
    • Żukowski, M.1    Zeilinger, A.2    Horne, M.A.3    Ekert, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.