Measuring-basis-encrypted six-state quantum key distribution scheme
暂无分享,去创建一个
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.
[3] Hoi-Kwong Lo,et al. A simple proof of the unconditional security of quantum key distribution , 1999, ArXiv.
[4] G. Long,et al. Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.
[5] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[6] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[7] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[8] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[9] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[10] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[11] Jian-Wei Pan,et al. Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.
[12] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[13] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Won Young Hwang,et al. Quantum cryptography without public announcement of bases , 1997 .