Security of two quantum cryptography protocols using the same four qubit states (18 pages)
暂无分享,去创建一个
[1] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[2] H. Yuen. Quantum detection and estimation theory , 1978, Proceedings of the IEEE.
[3] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[4] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[5] Horace P. Yuen,et al. Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .
[6] R. Griffiths,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. II. A QUANTUM CIRCUIT , 1997, quant-ph/9702015.
[7] Nicolas J. Cerf,et al. Asymmetric quantum cloning in any dimension , 1998, quant-ph/9805024.
[8] G. M. D'Ariano,et al. Phase-covariant quantum cloning , 1999, quant-ph/9909046.
[9] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[10] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[11] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[12] Miloslav Dusek,et al. Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .
[13] Dag Roar Hjelme,et al. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography , 2001 .
[14] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[15] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[16] Norbert Lütkenhaus,et al. Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.
[17] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[18] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[19] Nicolas Gisin,et al. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .
[20] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[21] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[22] V. Scarani,et al. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography , 2004, quant-ph/0408122.
[23] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .