Quantum vernam cipher
暂无分享,去创建一个
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] D. Leung,et al. Hiding bits in bell states. , 2000, Physical Review Letters.
[3] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[4] Laflamme,et al. Perfect Quantum Error Correcting Code. , 1996, Physical review letters.
[5] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[6] Andris Ambainis,et al. Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[7] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[8] Mihir Bellare,et al. Lecture Notes on Cryptography , 2001 .
[9] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[10] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[11] Daniel Gottesman,et al. Stabilizer Codes and Quantum Error Correction , 1997, quant-ph/9705052.
[12] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[13] Raymond Laflamme,et al. Concatenated Quantum Codes , 1996 .
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] Charles H. Bennett,et al. Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[16] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[17] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[18] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[19] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[20] Isaac L. Chuang,et al. Prescription for experimental determination of the dynamics of a quantum black box , 1997 .
[21] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[22] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[23] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[24] H. Lo. Classical-communication cost in distributed quantum-information processing: A generalization of quantum-communication complexity , 1999, quant-ph/9912009.
[25] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[26] Yong-Sheng Zhang,et al. Quantum key distribution via quantum encryption , 2000, quant-ph/0011034.
[27] C. H. Bennett,et al. Remote state preparation. , 2000, Physical review letters.