Quantum cryptography

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principle . . . . . . . . . . . . . . . 5 2 No cloning theorem . . . . . . . . . 6 3 Intercept-resend strategy . . . . . . 6 4 Error correction, privacy amplification and quantum secret growing . . 6 5 Advantage distillation . . . . . . . . 8 D Other protocols . . . . . . . . . . . . . 8 1 2-state protocol . . . . . . . . . . . 8 2 6-state protocol . . . . . . . . . . . 9 3 EPR protocol . . . . . . . . . . . . 9 4 Other variations . . . . . . . . . . . 10 E Quantum teleportation as “Quantum one-time-pad” . . . . . . . . . . . . . . 10 F Optical amplification, quantum nondemolition measurements and optimal quantum cloning . . . . . . . . . . . . . 10

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  G. S. Vernam,et al.  Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.

[3]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  A. N. Kolmogorov,et al.  Foundations of the theory of probability , 1960 .

[6]  J. Bell On the Problem of Hidden Variables in Quantum Mechanics , 1966 .

[7]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[8]  P. Davies The Logic of Personal Knowledge: Essays Presented to Michael Polanyi on his Seventieth Birthday , 1969 .

[9]  M. H. Pilkuhn,et al.  Infrared Photon Counting by Ge Avalanche Diodes , 1971 .

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Randall C. Thompson,et al.  Experimental Test of Local Hidden-Variable Theories , 1976 .

[12]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  A. Shimony,et al.  Bell's theorem. Experimental tests and implications , 1978 .

[15]  G. Roger,et al.  Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .

[16]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[17]  Peter W. Milonni,et al.  PHOTONS CANNOT ALWAYS BE REPLICATED , 1982 .

[18]  D. Dieks Communication by EPR devices , 1982 .

[19]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[20]  R. Kearney,et al.  Photon counting with photodiodes. , 1983, Applied optics.

[21]  L. Mandel,et al.  Photon Antibunching in Resonance Fluorescence , 1977 .

[22]  M. Berry Quantal phase factors accompanying adiabatic changes , 1984, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[23]  Joe C. Campbell,et al.  Room‐temperature 1.3‐μm optical time domain reflectometer using a photon counting InGaAs/InP avalanche detector , 1985 .

[24]  Hong,et al.  Theory of parametric frequency down conversion of light. , 1985, Physical review. A, General physics.

[25]  D. Deutsch Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[26]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[27]  Hong,et al.  Experimental realization of a localized one-photon state. , 1986, Physical review letters.

[28]  J G Rarity,et al.  Characterization of silicon avalanche photodiodes for photon correlation measurements. 1: Passive quenching. , 1986, Applied optics.

[29]  Tomita,et al.  Observation of Berry's topological phase by use of an optical fiber. , 1986, Physical review letters.

[30]  J G Rarity,et al.  Characterization of silicon avalanche photodiodes for photon correlation measurements. 2: Active quenching. , 1987, Applied optics.

[31]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[32]  E. Neumann Single-mode fibers fundamentals , 1988 .

[33]  E. Pike,et al.  Photons and Quantum Fluctuations , 2020 .

[34]  Shih,et al.  New type of Einstein-Podolsky-Rosen-Bohm experiment using pairs of light quanta produced by optical parametric down conversion. , 1988, Physical review letters.

[35]  M. Martinelli A universal compensator for polarization changes induced by birefringence on a retracing beam , 1989 .

[36]  Franson,et al.  Bell inequality for position and time. , 1989, Physical review letters.

[37]  Gilles Brassard,et al.  Modern Cryptology: A Tutorial , 1989 .

[38]  M Ghioni,et al.  High-accuracy picosecond characterization of gain-switched laser diodes. , 1989, Optics letters.

[39]  I. Pitowsky Quantum Probability ― Quantum Logic , 1989 .

[40]  R G Brown,et al.  Characterization of silicon avalanche photodiodes for photon correlation measurements. 3: Sub-Geiger operation. , 1989, Applied optics.

[41]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[42]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[43]  Franson,et al.  Nonlocal cancellation of dispersion. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[44]  Mario Martinelli,et al.  Time Reversal for the Polarization State in Optical Systems , 1992 .

[45]  Ekert,et al.  Practical quantum cryptography based on two-photon interferometry. , 1992, Physical review letters.

[46]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[47]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[48]  J. Feigenbaum Advances in cryptology--CRYPTO '91 : proceedings , 1992 .

[49]  Aephraim M. Steinberg,et al.  Dispersion cancellation in a measurement of the single-photon propagation velocity in glass. , 1992, Physical review letters.

[50]  Aephraim M. Steinberg,et al.  Dispersion cancellation and high-resolution time measurements in a fourth-order optical interferometer. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[51]  J. Rarity,et al.  Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel , 1993 .

[52]  G. Cancellieri Single-mode optical fiber measurement : characterization and sensing , 1993 .

[53]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[54]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[55]  Steinberg,et al.  High-efficiency single-photon detectors. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[56]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[57]  J. Rarity,et al.  Single photon interference in 10 km long optical fibre interferometer , 1993 .

[58]  N. Gisin,et al.  Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km , 1993 .

[59]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[60]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[61]  R. Penrose,et al.  Shadows of the Mind , 1994 .

[62]  P R Tapster,et al.  Photon counting with passively quenched germanium avalanche. , 1994, Applied optics.

[63]  N. Gisin,et al.  Quantum Cryptography with Polarized Photons in Optical Fibres: Experiment and Practical Limits , 1994 .

[64]  Rarity,et al.  Violation of Bell's inequality over 4 km of optical fiber. , 1994, Physical review letters.

[65]  Emmanuel Desurvire,et al.  The Golden Age of Optical Fiber Amplifiers , 1994 .

[66]  John Rarity,et al.  Quantum Random-number Generation and Key Sharing , 1994 .

[67]  F Zappa,et al.  Single-photon detection beyond 1 µm: performance of commercially available germanium photodiodes. , 1994, Applied optics.

[68]  F Zappa,et al.  Nanosecond single-photon timing with InGaAs/InP photodiodes. , 1994, Optics letters.

[69]  Yamamoto,et al.  Turnstile device for heralded single photons: Coulomb blockade of electron and hole tunneling in quantum confined p-i-n heterojunctions. , 1994, Physical review letters.

[70]  Martienssen,et al.  Geometric phases in two-photon interference experiments. , 1995, Physical Review A. Atomic, Molecular, and Optical Physics.

[71]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[72]  Nicolas Gisin,et al.  Definition of polarization mode dispersion and first results of the COST 241 round-robin measurements , 1995 .

[73]  Y Fainman,et al.  Long-distance frequency-division interferometer for communication and quantum cryptography. , 1995, Optics letters.

[74]  P. Townsend,et al.  Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.

[75]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[76]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[77]  James D. Franson,et al.  Operational system for quantum cryptography , 1995 .

[78]  Teich,et al.  Nonlocal cancellation of dispersive broadening in Mach-Zehnder interferometers. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[79]  N. Gisin,et al.  Underwater quantum coding , 1995, Nature.

[80]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[81]  Hall,et al.  Information Exclusion Principle for Complementary Observables. , 1995, Physical review letters.

[82]  D. Mayers The Trouble with Quantum Bit Commitment , 1996, quant-ph/9603015.

[83]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[84]  G. L. Morgan,et al.  Quantum Cryptography over Underground Optical Fibers , 1996, CRYPTO.

[85]  J. Franson,et al.  Quantum cryptography in free space. , 1996, Optics letters.

[86]  A. Lacaita,et al.  Avalanche photodiodes and quenching circuits for single-photon detection. , 1996, Applied optics.

[87]  N. Gisin,et al.  “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.

[88]  Buzek,et al.  Quantum copying: Beyond the no-cloning theorem. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[89]  Pérès,et al.  Quantum-state disturbance versus information gain: Uncertainty relations for quantum information. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[90]  Nobuyuki Imoto,et al.  Short Distance Applications of Quantum Cryptography , 1996 .

[91]  E. Biahm,et al.  Bounds on Information and the Security of Quantum Cryptography , 1996 .

[92]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[93]  M. Horodecki,et al.  Separability of mixed states: necessary and sufficient conditions , 1996, quant-ph/9605038.

[94]  Horace P. Yuen,et al.  Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .

[95]  Lütkenhaus Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[96]  Lloyd M. Davis,et al.  Actively quenched single‐photon avalanche diode for high repetition rate time‐gated photon counting , 1996 .

[97]  Gisin,et al.  Unambiguous quantum measurement of nonorthogonal states. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[98]  N. Gisin,et al.  Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .

[99]  Jean-Pierre Goedgebuer,et al.  Spectral coding for secure optical communications using refractive index dispersion , 1997 .

[100]  N. Gisin,et al.  Coherent eavesdropping strategies for the four state quantum cryptography protocol , 1997 .

[101]  N. Gisin,et al.  Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.

[102]  H. F. Chau,et al.  Why quantum bit commitment and ideal quantum coin tossing are impossible , 1997 .

[103]  N. Mermin Quantum theory: Concepts and methods , 1997 .

[104]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[105]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[106]  S. Massar,et al.  Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.

[107]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[108]  Eugene P. Wigner,et al.  The Probability of the Existence of a Self-Reproducing Unit , 1997 .

[109]  N. Gisin,et al.  Interferometry with Faraday mirrors for quantum cryptography , 1997 .

[110]  Nicolas Gisin,et al.  Statistical prediction and experimental verification of concatenations of fiber optic components with polarization dependent loss , 1998 .

[111]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[112]  E. Costard,et al.  Enhanced Spontaneous Emission by Quantum Boxes in a Monolithic Optical Microcavity , 1998 .

[113]  N. Gisin,et al.  Performance of InGaAs/InP Avalanche Photodiodes as Gated-Mode Photon Counters. , 1998, Applied optics.

[114]  C. M. Simmons,et al.  Practical free-space quantum key distribution over 1 km , 1998 .

[115]  N. Gisin,et al.  Violation of Bell Inequalities by Photons More Than 10 km Apart , 1998, quant-ph/9806043.

[116]  H. Chau,et al.  Efficient Quantum Key Distribution , 1998, quant-ph/9803007.

[117]  H. Weinfurter,et al.  Violation of Bell's Inequality under Strict Einstein Locality Conditions , 1998, quant-ph/9810080.

[118]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[119]  S.N.Molotkov Quantum cryptography based on photon ``frequency'' states: example of a possible realization , 1998, quant-ph/9811038.

[120]  Nicolas Gisin Quantum cloning without signaling , 1998 .

[121]  John Rarity,et al.  INTENSITY FLUCTUATION SPECTROSCOPY OF SMALL NUMBERS OF DYE MOLECULES IN A MICROCAVITY , 1998 .

[122]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[123]  D. Bruß,et al.  Optimal Universal Quantum Cloning and State Estimation , 1997, quant-ph/9712019.

[124]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[125]  P.D. Townsend,et al.  Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998, IEEE Photonics Technology Letters.

[126]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[127]  Nicolas Gisin,et al.  Fast and user-friendly quantum key distribution , 2000 .

[128]  N. Gisin,et al.  Long-distance Bell-type tests using energy-time entangled photons , 1998, quant-ph/9809025.

[129]  A. Zeilinger Experiment and the Foundations of Quantum Physics , 1999 .

[130]  N. Gisin,et al.  Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1999 .

[131]  A Karlsson,et al.  Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. , 1999, Optics express.

[132]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[133]  Paul D. Townsend Quantum cryptography in optical fiber networks , 1999, OFC/IOOC . Technical Digest. Optical Fiber Communication Conference, 1999, and the International Conference on Integrated Optics and Optical Fiber Communication.

[134]  J. Raimond,et al.  Seeing a single photon without destroying it , 1999, Nature.

[135]  Jean-Marc Merolla,et al.  Single-Photon Interference in Sidebands of Phase-Modulated Light for Quantum Cryptography , 1999 .

[136]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[137]  M. Orrit,et al.  Triggered Source of Single Photons based on Controlled Single Molecule Fluorescence , 1999 .

[138]  Edo Waks,et al.  Ultra-bright source of polarization-entangled photons , 1999 .

[139]  Y. Yamamoto,et al.  A single-photon turnstile device , 1999, Nature.

[140]  S. Wolf,et al.  Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.

[141]  J. Cirac,et al.  Quantum repeaters based on entanglement purification , 1998, quant-ph/9808065.

[142]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[143]  N. Gisin,et al.  A local hidden variable model of quantum correlation exploiting the detection loophole , 1999 .

[144]  N. Gisin,et al.  Bell inequality and the locality loophole: Active versus passive switches , 1999, quant-ph/9906049.

[145]  Robert B. Griffiths,et al.  Two qubit copying machine for economical quantum eavesdropping , 1999 .

[146]  Anders Karlsson,et al.  A single-photon counter for long-haul telecom , 1999 .

[147]  Jean-Michel Gérard,et al.  Strong Purcell effect for InAs quantum boxes in three-dimensional solid-state microcavities , 1999 .

[148]  N. Gisin,et al.  Optical quantum random number generator , 1999, quant-ph/9907006.

[149]  Gisin,et al.  Quantum cryptography using entangled photons in energy-time bell states , 1999, Physical review letters.

[150]  J. Rarity,et al.  Single-photon counting for the 1300-1600-nm range by use of peltier-cooled and passively quenched InGaAs avalanche photodiodes. , 2000, Applied optics.

[151]  H Bechmann-Pasquinucci,et al.  Quantum cryptography with 3-state systems. , 2000, Physical review letters.

[152]  Weinfurter,et al.  Quantum cryptography with entangled photons , 1999, Physical review letters.

[153]  R. Brouri,et al.  Photon antibunching in the fluorescence of individual color centers in diamond. , 2000, Optics letters.

[154]  A. Ekert Coded secrets cracked open , 2000 .

[155]  G. Weihs,et al.  Optimal photon cloning , 2000 .

[156]  H. Weinfurter,et al.  A fast and compact quantum random number generator , 1999, quant-ph/9912118.

[157]  Peterson,et al.  Daylight quantum key distribution over 1.6 km , 2000, Physical review letters.

[158]  Nicolas Gisin,et al.  Linking Classical and Quantum Key Agreement: Is There "Bound Information"? , 2000, CRYPTO.

[159]  John Canning,et al.  Complex mode coupling within air-silica structured optical fibres and applications , 2000 .

[160]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[161]  Mayer,et al.  Stable solid-state source of single photons , 2000, Physical review letters.

[162]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[163]  F. Martini,et al.  Schroedinger cat states and optimum universal quantum cloning by entangled parametric amplification , 2000 .

[164]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[165]  N. Gisin,et al.  Highly efficient photon-pair source using periodically poled lithium niobate waveguide , 2000 .

[166]  White,et al.  Entangled state quantum cryptography: eavesdropping on the ekert protocol , 1999, Physical review letters.

[167]  Zeilinger,et al.  Optimal quantum cloning via stimulated emission , 2000, Physical review letters.

[168]  N. Gisin,et al.  Long-distance entanglement-based quantum key distribution , 2000, quant-ph/0008039.

[169]  Miloslav Dusek,et al.  Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .

[170]  Boris I. Shraiman,et al.  Towards the clarity limit in optical fibre , 2000, Nature.

[171]  H. Bechmann-Pasquinucci,et al.  Quantum Cryptography using larger alphabets , 1999, quant-ph/9910095.

[172]  P. Petroff,et al.  A quantum dot single-photon turnstile device. , 2000, Science.

[173]  G. Gilbert,et al.  Practical Quantum Cryptography: A Comprehensive Analysis (Part One) , 2000, quant-ph/0009027.

[174]  Wild,et al.  Nonclassical photon statistics in single-molecule fluorescence at room temperature , 2000, Physical review letters.

[175]  Nicolas Gisin,et al.  Measurement of nonlinear polarization rotation in a highly birefringent optical fibre using a Faraday mirror , 2000 .

[176]  J. P. Ciscar,et al.  Experimental long wavelength quantum cryptography: From single-photon transmission to key extraction protocols , 2000 .

[177]  D. Bethune,et al.  An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light , 2000, IEEE Journal of Quantum Electronics.

[178]  Y. Yamamoto,et al.  Triggered single photons from a quantum dot. , 2001, Physical review letters.

[179]  N. Gisin,et al.  Experimental demonstration of quantum secret sharing , 2001 .

[180]  R. Renner,et al.  Bound Information: The Classical Analog to Bound Quantum Entanglemen , 2001 .

[181]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[182]  N. Gisin,et al.  Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses , 2001, quant-ph/0102062.

[183]  S. Barnett,et al.  Experimental demonstration of optimal unambiguous state discrimination , 2000, quant-ph/0007063.

[184]  M. Bourennane,et al.  QUANTUM KEY DISTRIBUTION USING MULTILEVEL ENCODING , 2001 .

[185]  Vlatko Vedral,et al.  Security of EPR-based quantum cryptography against incoherent symmetric attacks , 2001 .

[186]  John G. Rarity,et al.  Photon counting for quantum key distribution with peltier cooled InGaAs/InP APDs , 2001 .

[187]  H. Weinfurter,et al.  The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? , 2001, quant-ph/0104103.

[188]  John Rarity,et al.  Secure free-space key exchange to 1.9 km and beyond , 2001 .

[189]  Andrew G. Glen,et al.  APPL , 2001 .

[190]  V.F. Kleist,et al.  The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.

[191]  Peterson,et al.  Free space quantum key distribution in daylight , 2002, QELS 2002.

[192]  R. Griffiths,et al.  Quantum Measurements , 2021, Introduction to Quantum Mechanics.

[193]  A. Sridharan Broadcast Channels , 2022 .