Flexible quantum private queries based on quantum key distribution.
暂无分享,去创建一个
[1] Seth Lloyd,et al. Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.
[2] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[3] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[4] U. Herzog,et al. Optimum unambiguous discrimination of two mixed quantum states , 2005, quant-ph/0502117.
[5] S. Lloyd,et al. Experimental quantum private queries with linear optics , 2009 .
[6] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[7] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[8] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[9] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[10] Lukasz Olejnik,et al. Secure quantum private information retrieval using phase-encoded queries , 2011 .
[11] C. Helstrom. Quantum detection and estimation theory , 1969 .
[12] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.