Reliability of Calderbank?Shor?Steane codes and security of quantum key distribution
暂无分享,去创建一个
[1] M. Horodecki,et al. General teleportation channel, singlet fraction and quasi-distillation , 1998, quant-ph/9807091.
[2] John Preskill,et al. Secure quantum key distribution using squeezed states , 2001 .
[3] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[4] A. Holevo. Statistical structure of quantum theory , 2001 .
[5] Horace P. Yuen. KCQ: A New Approach to Quantum Cryptography I. General Principles and Qubit Key Generation , 2003 .
[6] K. E. Hellwig. General scheme of measurement processes , 1995 .
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] L. Grove,et al. Classical Groups and Geometric Algebra , 2001 .
[9] Simon Litsyn,et al. Quantum error detection II: Bounds , 1999, IEEE Trans. Inf. Theory.
[10] Amir Dembo,et al. Large Deviations Techniques and Applications , 1998 .
[11] Mitsuru Hamada. Lower bounds on the quantum capacity and highest error exponent of general memoryless channels , 2002, IEEE Trans. Inf. Theory.
[12] K. Kraus. General state changes in quantum theory , 1971 .
[13] N. J. A. Sloane,et al. Quantum Error Correction Via Codes Over GF(4) , 1998, IEEE Trans. Inf. Theory.
[14] Mitsuru Hamada. Teleportation and entanglement distillation in the presence of correlation among bipartite mixed states , 2003 .
[15] H. Weyl. Gruppentheorie und Quantenmechanik , 1928 .
[16] R. Werner. All teleportation and dense coding schemes , 2000, quant-ph/0003070.
[17] A. Steane. Multiple-particle interference and quantum error correction , 1996, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[18] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[19] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[20] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[21] E. Biham,et al. Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.
[22] A. Calderbank,et al. Quantum Error Correction and Orthogonal Geometry , 1996, quant-ph/9605005.
[23] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[24] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[25] Man-Duen Choi. Completely positive linear maps on complex matrices , 1975 .
[26] Mitsuru Hamada. Exponential lower bound on the highest fidelity achievable by quantum error-correcting codes , 2002 .
[27] Shor,et al. Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[28] M. Hamada. Information rates achievable with algebraic codes on quantum discrete memoryless channels , 2005, IEEE Transactions on Information Theory.
[29] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[30] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[31] E. Knill,et al. Theory of quantum error-correcting codes , 1997 .
[32] Andrew M. Steane. Efficient fault-tolerant quantum computing , 1999, Nature.
[33] M. Aschbacher. Finite Group Theory: Index , 2000 .
[34] Schumacher,et al. Sending entanglement through noisy quantum channels. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[35] Patrick Billingsley,et al. Probability and Measure. , 1986 .
[36] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[37] Gottesman. Class of quantum error-correcting codes saturating the quantum Hamming bound. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[38] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[39] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[40] Imre Csiszár,et al. Graph decomposition: A new key to coding theorems , 1981, IEEE Trans. Inf. Theory.
[41] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[42] Daniel Gottesman,et al. Stabilizer Codes and Quantum Error Correction , 1997, quant-ph/9705052.
[43] Mitsuru Hamada. NOTES ON THE FIDELITY OF SYMPLECTIC QUANTUM ERROR-CORRECTING CODES , 2003 .
[44] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[45] I. Devetak,et al. The private classical information capacity and quantum information capacity of a quantum channel , 2003 .
[46] Alexander Barg,et al. A Low-Rate Bound on the Reliability of a Quantum Discrete Memoryless Channel , 2001 .
[47] H. Weyl. The Theory Of Groups And Quantum Mechanics , 1931 .