Position-based quantum cryptography over untrusted networks
暂无分享,去创建一个
[1] Lev Vaidman. Instantaneous measurement of nonlocal variables. , 2003, Physical review letters.
[2] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[3] Adrian Kent. Quantum tagging for tags containing secret classical data , 2011 .
[4] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[5] H. Lo,et al. Insecurity of position-based quantum-cryptography protocols against entanglement attacks , 2010, 1009.2256.
[6] Ekert,et al. "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.
[7] A. Holevo. Problems in the mathematical theory of quantum communication channels , 1977 .
[8] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[9] Robert A. Malaney,et al. Location-dependent communications using quantum entanglement , 2010, 1003.0949.
[10] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[11] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[12] Adan Cabello. Quantum key distribution without alternative measurements , 2000 .
[13] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[14] Adrian Kent,et al. Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints , 2010, ArXiv.
[15] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[16] Adan Cabello. Reply to `Comment on ``Quantum key distribution without alternative measurements''' , 2000 .
[17] Mann,et al. Maximal violation of Bell inequalities for mixed states. , 1992, Physical review letters.
[18] Guang-Can Guo,et al. Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .
[19] Rafail Ostrovsky,et al. Position Based Cryptography , 2009, CRYPTO.
[20] Salman Beigi,et al. Simplified instantaneous non-local quantum computation with applications to position-based cryptography , 2011, 1101.1065.
[21] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .