Theory and Applications of Models of Computation at the Turing Centenary in China : Preface
暂无分享,去创建一个
[1] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.
[2] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[3] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[4] D. Deutsch. Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[5] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[6] R. Renner,et al. An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.
[7] Ivan Damgård,et al. Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..
[8] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[9] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[10] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[11] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[12] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[13] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[14] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[15] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[16] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[17] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[18] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[19] Renato Renner,et al. The ultimate physical limits of privacy , 2014, Nature.
[20] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[21] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.