Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Charles H. Bennett,et al. Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.
[3] Nicolas Gisin,et al. Quantum cloning, eavesdropping and Bell's inequality , 1997 .
[4] S. Popescu,et al. Thermodynamics and the measure of entanglement , 1996, quant-ph/9610044.
[5] Ashish V. Thapliyal,et al. Evidence for bound entangled states with negative partial transpose , 1999, quant-ph/9910026.
[6] P. Horodecki. Separability criterion and inseparable mixed states with positive partial transposition , 1997, quant-ph/9703004.
[7] Buzek,et al. Quantum copying: Beyond the no-cloning theorem. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[8] N. Gisin. Stochastic quantum dynamics and relativity , 1989 .
[9] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[10] S. Wolf,et al. Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.
[11] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[12] N. Gisin,et al. Quantum cryptography , 1998 .
[13] N. Mermin,et al. The Ithaca interpretation of quantum mechanics , 1996, quant-ph/9609013.
[14] N. Mermin. Quantum theory: Concepts and methods , 1997 .
[15] M. Horodecki,et al. BOUND ENTANGLEMENT CAN BE ACTIVATED , 1998, quant-ph/9806058.
[16] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[17] M. Horodecki,et al. Mixed-State Entanglement and Distillation: Is there a “Bound” Entanglement in Nature? , 1998, quant-ph/9801069.
[18] Stefan Wolf,et al. Information-theoretically and computationally secure key agreement in cryptography , 1999 .
[19] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, CRYPTO.
[20] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[21] N. Gisin,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .
[22] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[23] Pérès. Separability Criterion for Density Matrices. , 1996, Physical review letters.
[24] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[25] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[26] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[27] S. Massar,et al. Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.
[28] N. Gisin,et al. Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.
[29] R. Jozsa,et al. A Complete Classification of Quantum Ensembles Having a Given Density Matrix , 1993 .
[30] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.