A Survey on Quantum Cryptographic Protocols and Their Security
暂无分享,去创建一个
Hoi-Kwong Lo | C.-H.F. Fung | H. Lo | C. Fung
[1] V. Scarani,et al. Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography , 2006, Quantum Inf. Comput..
[2] H. Lo,et al. Discrete rotational symmetry and quantum-key-distribution protocols , 2006, quant-ph/0604198.
[3] Hoi-Kwong Lo,et al. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry , 2006 .
[4] H. Lo,et al. Performance of two quantum-key-distribution protocols , 2006 .
[5] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[6] M. Koashi. Security of quantum key distribution with discrete rotational symmetry , 2005, quant-ph/0507154.
[7] Xiang‐Bin Wang,et al. Beating the photon-number-splitting attack in practical quantum cryptography. , 2004, Physical review letters.
[8] R. Laflamme,et al. Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.
[9] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[10] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[11] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[12] H. Chau,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2000, Journal of Cryptology.
[13] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[14] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[15] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[16] Simon J. D. Phoenix,et al. Three-state quantum cryptography , 2000 .
[17] H. Chau,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.
[18] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.