Insider-Proof Encryption with Applications for Quantum Key Distribution
暂无分享,去创建一个
[1] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[2] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[3] Roger Colbeck,et al. Prisoners of their own device: Trojan attacks on device-independent quantum cryptography , 2012 .
[4] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[5] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[6] Umesh V. Vazirani,et al. A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games , 2012, ITCS '13.
[7] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[8] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[9] W. Wootters,et al. Distributed Entanglement , 1999, quant-ph/9907047.
[10] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[11] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[12] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[13] Adam D. Smith,et al. Leftover Hashing Against Quantum Side Information , 2011, IEEE Transactions on Information Theory.
[14] Adrian Kent,et al. Unconditionally secure device-independent quantum key distribution with only two devices , 2012, ArXiv.
[15] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[16] Umesh Vazirani,et al. Classical command of quantum systems via rigidity of CHSH games , 2012, 1209.0449.
[17] Renato Renner,et al. Efficient Device-Independent Quantum Key Distribution , 2010, EUROCRYPT.
[18] Renato Renner,et al. Device-Independent Quantum Key Distribution with Commuting Measurements , 2010, ArXiv.
[19] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.