Security of Quantum Key Distribution against All Collective Attacks
暂无分享,去创建一个
[1] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[2] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[5] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[6] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[7] L. Ballentine,et al. Quantum Theory: Concepts and Methods , 1994 .
[8] N. Fisher,et al. Probability Inequalities for Sums of Bounded Random Variables , 1994 .
[9] Bennett,et al. Parity bit in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[10] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[11] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[12] C. Fuchs. Distinguishability and Accessible Information in Quantum Theory , 1996, quant-ph/9601020.
[13] E. Biahm,et al. Bounds on Information and the Security of Quantum Cryptography , 1996 .
[14] N. Gisin,et al. Quantum cryptography , 1998 .
[15] E. Biham,et al. Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.
[16] Jeroen van de Graaf,et al. Towards a formal definition of security for quantum protocols , 1998 .
[17] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[18] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[19] Jeroen van de Graaf,et al. Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.
[20] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[21] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[22] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[23] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.