Security of Quantum Key Distribution against All Collective Attacks

[1]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[2]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[3]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[4]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[5]  H. Chau,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.

[6]  Jeroen van de Graaf,et al.  Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.

[7]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[8]  Jeroen van de Graaf,et al.  Towards a formal definition of security for quantum protocols , 1998 .

[9]  N. Mermin Quantum theory: Concepts and methods , 1997 .

[10]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[11]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[12]  D. Mayers Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[13]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[14]  E. Biham,et al.  Bounds on Information and the Security of Quantum Cryptography , 1996, quant-ph/9605010.

[15]  Bennett,et al.  Parity bit in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[16]  C. Fuchs Distinguishability and Accessible Information in Quantum Theory , 1996, quant-ph/9601020.

[17]  N. Fisher,et al.  Probability Inequalities for Sums of Bounded Random Variables , 1994 .

[18]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[19]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[20]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[21]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[22]  W. Hoeffding Probability inequalities for sum of bounded random variables , 1963 .