SECURITY ENHANCED DIRECT QUANTUM COMMUNICATION WITH HIGHER BIT-RATE
暂无分享,去创建一个
Alireza Bahrampour | Mohammad Hossein Zandi | Soudeh Jahanshahi | M. Zandi | A. Bahrampour | S. Jahanshahi
[1] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[2] Qiaoyan Wen,et al. Quantum secure direct communication with χ -type entangled states , 2008 .
[3] P. Mateus,et al. Fair and optimistic quantum contract signing , 2011, 1106.2922.
[4] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[5] Qiaoyan Wen,et al. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .
[6] Jaroslaw Adam Miszczak,et al. Increasing the security of the ping–pong protocol by using many mutually unbiased bases , 2012, Quantum Inf. Process..
[7] Eugene V. Vasiliu. Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits , 2011, Quantum Inf. Process..
[8] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[9] Piotr Zawadzki. THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION , 2012 .
[10] T. Felbinger,et al. On the security of the ping-pong protocol , 2007, 0708.2986.
[11] Kaoru Shimizu,et al. Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .
[12] Zhan-jun Zhang,et al. Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .
[13] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[14] S. Girvin,et al. Introduction to quantum noise, measurement, and amplification , 2008, 0810.4729.
[15] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[16] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[17] Hermann Kampermann,et al. Distributed super dense coding over noisy channels , 2012 .
[18] V. Scarani,et al. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography , 2004, quant-ph/0408122.
[19] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[20] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[21] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[22] Harald Weinfurter,et al. Secure Communication with a Publicly Known Key , 2001 .
[23] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[24] Qing-yu Cai,et al. Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.
[25] Todd A. Brun,et al. Quantum steganography , 2010, Digital Media Steganography.
[26] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[27] Mark M. Wilde,et al. Public and private communication with a quantum channel and a secret key , 2009, 0903.3920.
[28] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[29] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[30] Piotr Zawadzki. Security of ping-pong protocol based on pairs of completely entangled qudits , 2012, Quantum Inf. Process..
[31] Chil-Min Kim,et al. Quantum key distribution with blind polarization bases. , 2005, Physical review letters.