暂无分享,去创建一个
[1] Roger Colbeck,et al. Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.
[2] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[3] Stefano Pironio,et al. Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.
[4] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[5] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[6] Stefano Pironio,et al. Random numbers certified by Bell’s theorem , 2009, Nature.
[7] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[8] Adrian Kent,et al. Private randomness expansion with untrusted devices , 2010, 1011.4474.
[9] Adrian Kent,et al. Secure Classical Bit Commitment Using Fixed Capacity Communication Channels , 1999, Journal of Cryptology.
[10] Lluis Masanes,et al. Universally-composable privacy amplification from causality constraints , 2008, Physical review letters.
[11] M. Mckague,et al. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices , 2009, 0908.0503.
[12] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[13] Renato Renner,et al. Device-Independent Quantum Key Distribution with Commuting Measurements , 2010, ArXiv.
[14] Adrian Kent,et al. Unconditionally Secure Bit Commitment , 1998, quant-ph/9810068.
[15] Andreas J. Winter,et al. Unconditional security of key distribution from causality constraints , 2006, ArXiv.
[16] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[17] Esther Hanggi,et al. Quantum Cryptography Based Solely on Bell's Theorem , 2009 .