Controlled order rearrangement encryption for quantum key distribution
暂无分享,去创建一个
[1] K. Matsumoto,et al. Shor-Preskill-type security proof for quantum key distribution without public announcement of bases , 2002, quant-ph/0201053.
[2] P. Xue,et al. Conditional efficient multiuser quantum cryptography network , 2002 .
[3] A. C. Funk,et al. Quantum key distribution using nonclassical photon-number correlations in macroscopic light pulses , 2001, quant-ph/0109071.
[4] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[5] Michael Pepper,et al. Electrically Driven Single-Photon Source , 2001, Science.
[6] Jun Yu Li,et al. Quantum key distribution scheme with orthogonal product states , 2001, quant-ph/0102060.
[7] N. Gisin,et al. Long-distance entanglement-based quantum key distribution , 2000, quant-ph/0008039.
[8] A. Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[9] Shenmin Zhang,et al. LASERS, OPTICS, AND OPTOELECTRONICS 3673 Detection of single photons using a field-effect transistor gated by a layer of quantum dots , 2000 .
[10] Richard J. Hughes,et al. Daylight quantum key distribution over 1.6 km , 2000, Physical review letters.
[11] N. Gisin,et al. Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1998, quant-ph/9809034.
[12] N. Gisin,et al. Long-distance Bell-type tests using energy-time entangled photons , 1998, quant-ph/9809025.
[13] Masato Koashi,et al. Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps , 1997 .
[14] W. Hwang,et al. Quantum cryptography without public announcement of bases , 1997, quant-ph/9702009.
[15] N. Gisin,et al. “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.
[16] P. Townsend,et al. Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.
[17] S. Barnett,et al. Multi-user Quantum Cryptography on Optical Networks , 1995 .
[18] Simon J. D. Phoenix,et al. Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .
[19] Vaidman,et al. Quantum cryptography based on orthogonal states. , 1995, Physical review letters.
[20] N. Imoto,et al. Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.
[21] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[22] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[23] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[24] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[25] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..