Device-independent quantum key distribution secure against collective attacks
暂无分享,去创建一个
V. Scarani | S. Massar | N. Gisin | A. Acín | S. Pironio | N. Brunner | Stefano Pironio
[1] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[2] P. Pearle. Hidden-Variable Example Based upon Data Rejection , 1970 .
[3] G. Roger,et al. Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .
[4] J. Bell,et al. Speakable and Unspeakable in Quatum Mechanics , 1988 .
[5] A. Zeilinger,et al. Speakable and Unspeakable in Quantum Mechanics , 1989 .
[6] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[7] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[8] M. Horodecki,et al. Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .
[9] N. Gisin,et al. Violation of Bell Inequalities by Photons More Than 10 km Apart , 1998, quant-ph/9806043.
[10] H. Weinfurter,et al. Violation of Bell's Inequality under Strict Einstein Locality Conditions , 1998, quant-ph/9810080.
[11] Luis L. Sánchez-Soto,et al. COMPLETE CHARACTERIZATION OF ARBITRARY QUANTUM MEASUREMENT PROCESSES , 1999 .
[12] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[13] Jaromir Fiurasek. Maximum-likelihood estimation of quantum measurement , 2001 .
[14] C. Monroe,et al. Experimental violation of a Bell's inequality with efficient detection , 2001, Nature.
[15] Jan-Åke Larsson. A practical trojan horse for bell-inequality-based quantum cryptography , 2001, Quantum Inf. Comput..
[16] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[17] D. Bruß,et al. Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.
[18] Frank Verstraete,et al. Entanglement versus bell violations and their behavior under local filtering operations. , 2002, Physical review letters.
[19] Stefano Pironio,et al. Bell inequalities resistant to detector inefficiency , 2002 .
[20] Richard Gill,et al. Bell's inequality and the coincidence-time loophole , 2003, quant-ph/0312035.
[21] Giacomo Mauro D'Ariano,et al. Quantum calibration of measurement instrumentation. , 2004, Physical review letters.
[22] Andrew Chi-Chih Yao,et al. Self testing quantum apparatus , 2004, Quantum Inf. Comput..
[23] S. Massar,et al. Nonlocal correlations as an information-theoretic resource , 2004, quant-ph/0404097.
[24] S. Massar,et al. Error filtration and entanglement purification for quantum communication (17 pages) , 2004, quant-ph/0407021.
[25] Stefano Pironio,et al. Nonlocal correlations as an information-theoretic resource (11 pages) , 2005 .
[26] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[27] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[28] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[29] Vlatko Vedral,et al. Crucial role of quantum entanglement in bulk properties of solids (4 pages) , 2004, quant-ph/0410138.
[30] N. Gisin,et al. General properties of nonsignaling theories , 2005, quant-ph/0508016.
[31] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[32] L. Masanes. Asymptotic violation of Bell inequalities and distillability. , 2005, Physical review letters.
[33] Stefano Pironio,et al. Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.
[34] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[35] V. Scarani,et al. Secrecy extraction from no-signaling correlations , 2006, quant-ph/0606197.
[36] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[37] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[38] R. Renner. Symmetry of large physical systems implies independence of subsystems , 2007 .
[39] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[40] Jonathan Barrett,et al. The de Finetti theorem for test spaces , 2007, 0712.2265.
[41] A. Acín,et al. A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations , 2008, 0803.4290.
[42] V. Scarani,et al. Testing the dimension of Hilbert spaces. , 2008, Physical review letters.
[43] H. J. Kimble,et al. The quantum internet , 2008, Nature.
[44] N. Gisin,et al. Partial list of bipartite Bell inequalities with four binary settings , 2007, 0711.3362.
[45] D. Matsukevich,et al. Bell inequality violation with two remote atomic qubits. , 2008, Physical review letters.
[46] Jens Eisert,et al. Tomography of quantum detectors , 2009 .
[47] Matthias Christandl,et al. Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.
[48] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[49] T. V'ertesi,et al. Quantum bounds on Bell inequalities , 2008, 0810.1615.
[50] Dave Cliff,et al. In/Proceedings of the 15th IEEE International Conference on the Engineering of Complex Computer Systems/ (ICECCS 2010), Oxford , 2010 .