Eavesdropping on the two-way quantum communication protocols with invisible photons
暂无分享,去创建一个
[1] Fei Gao,et al. Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' , 2005 .
[2] Chil-Min Kim,et al. Quantum key distribution with blind polarization bases. , 2005, Physical review letters.
[3] T. Felbinger,et al. Comment on 'Secure direct communication with a quantum one-time pad' , 2004, quant-ph/0406115.
[4] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2004, Physical review letters.
[5] A. Wójcik. Comment on 'Quantum dense key distribution' , 2004, quant-ph/0405035.
[6] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[7] Lü Hua,et al. Cai–Li Communication Protocol in Noisy Quantum Channel , 2004 .
[8] Fuguo Deng,et al. Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .
[9] Fuguo Deng,et al. Secure direct communication with a quantum one-time pad , 2004, quant-ph/0405177.
[10] Cai Qing-yu,et al. Deterministic secure communication without using entanglement , 2004 .
[11] A. Colla,et al. Quantum dense key distribution , 2003, quant-ph/0312128.
[12] Qing-yu Cai,et al. Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.
[13] M. Lewenstein,et al. Entanglement as a precondition for secure quantum key distribution. , 2003, Physical review letters.
[14] Q. Cai. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[15] A. Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2002, Physical review letters.
[16] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[17] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[18] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[19] T. Kutsuwa,et al. A single-photon detector in the far-infrared range , 2000, Nature.
[20] G. Brassard,et al. Security aspects of practical quantum cryptography , 1999, Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504).
[21] H. Chau,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.
[22] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[23] Karsten P. Ulland,et al. Vii. References , 2022 .