Unconditional security of practical quantum key distribution

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[3]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[4]  M. Bourennane,et al.  Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. , 1999, Optics express.

[5]  P.D. Townsend,et al.  Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998, IEEE Photonics Technology Letters.

[6]  H. Chau,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.

[7]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[8]  N. Mermin Quantum theory: Concepts and methods , 1997 .

[9]  J. Cirac,et al.  Coherent eavesdropping strategies for the four state quantum cryptography protocol , 1997, quant-ph/9702002.

[10]  Horace P. Yuen,et al.  Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .

[11]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[12]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[13]  P. Townsend,et al.  Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.

[14]  N. Imoto,et al.  Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.

[15]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[16]  Charles H. Bennett,et al.  Experimental quantum cryptography , 1991, Journal of Cryptology.

[17]  Dominic Mayers,et al.  VIOLATION OF LOCALITY AND SELF-CHECKING SOURCE: A BRIEF ACCOUNT , 2002 .

[18]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .