Theory and Applications of Models of Computation at the Turing Centenary in China : Preface

[1]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[2]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[3]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[4]  D. Deutsch Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[5]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[6]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[7]  Ivan Damgård,et al.  Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..

[8]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[9]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[10]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[11]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[12]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[13]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[14]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[15]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[16]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[17]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[18]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[19]  Renato Renner,et al.  The ultimate physical limits of privacy , 2014, Nature.

[20]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[21]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.