Quantum Information Processing with Adversarial Devices
暂无分享,去创建一个
[1] Absolute Valued Real Algebras , 1947 .
[2] Lluis Masanes,et al. Universally-composable privacy amplification from causality constraints , 2008, Physical review letters.
[3] Andreas Winter,et al. Security of key distribution from causality constraints , 2006 .
[4] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[5] Stefano Pironio,et al. Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.
[6] A. Doherty,et al. Better Bell-inequality violation by collective measurements , 2006, quant-ph/0604045.
[7] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[8] A. Winter,et al. Information causality as a physical principle , 2009, Nature.
[9] Samuel L. Braunstein,et al. Wringing out better Bell inequalities , 1989 .
[10] Elad Eban,et al. Interactive Proofs For Quantum Computations , 2017, 1704.04487.
[11] S. Popescu,et al. Quantum nonlocality as an axiom , 1994 .
[12] Michele Mosca,et al. Generalized Self-testing and the Security of the 6-State Protocol , 2010, TQC.
[13] R. Renner. Symmetry of large physical systems implies independence of subsystems , 2007 .
[14] Eberhard,et al. Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.
[15] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[16] Frédéric Magniez,et al. Self-testing of universal and fault-tolerant sets of quantum gates , 2000, STOC '00.
[17] Terry Rudolph,et al. A 2 rebit gate universal for quantum computing , 2002 .
[18] T. V'ertesi,et al. Efficiency of higher-dimensional Hilbert spaces for the violation of Bell inequalities , 2007, 0712.4320.
[19] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[20] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[21] S. Adler,et al. Quaternionic quantum mechanics and quantum fields , 1995 .
[22] Man-Duen Choi. Completely positive linear maps on complex matrices , 1975 .
[23] Christian Kurtsiefer,et al. Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.
[24] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[25] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[26] G. M. Il'mushkin. Spectral functions of a regular symmetric difference operator , 1979 .
[27] M. Mckague,et al. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices , 2009, 0908.0503.
[28] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[29] M. Horodecki,et al. Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .
[30] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[31] Seth Lloyd,et al. Adiabatic quantum computation is equivalent to standard quantum computation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[32] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[33] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[34] B. S. Cirel'son. Quantum generalizations of Bell's inequality , 1980 .
[35] N. Gisin,et al. Maximal violation of Bell's inequality for arbitrarily large spin , 1992 .
[36] H. Buhrman,et al. Limit on nonlocality in any world in which communication complexity is not trivial. , 2005, Physical review letters.
[37] Frank Verstraete,et al. Entanglement versus bell violations and their behavior under local filtering operations. , 2002, Physical review letters.
[38] S. Massar,et al. Nonlocal correlations as an information-theoretic resource , 2004, quant-ph/0404097.
[39] Ueli Maurer,et al. Small accessible quantum information does not imply security. , 2007, Physical review letters.
[40] N. Gisin. Bell Inequalities: Many Questions, a Few Answers , 2007, quant-ph/0702021.
[41] N. Gisin,et al. Simulating quantum systems using real Hilbert spaces. , 2008, Physical review letters.
[42] Wim van Dam. Implausible consequences of superstrong nonlocality , 2012, Natural Computing.
[43] John Watrous. Cs 798: Theory of Quantum Information Operator Decompositions and Norms; Operator-vector Correspondence 1.1 the Spectral Decomposition , 2007 .
[44] R Raussendorf,et al. A one-way quantum computer. , 2001, Physical review letters.
[45] L. Masanes. Asymptotic violation of Bell inequalities and distillability. , 2005, Physical review letters.
[46] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[47] Andrew Chi-Chih Yao,et al. Self testing quantum apparatus , 2004, Quantum Inf. Comput..
[48] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[49] S. Massar,et al. Device-independent state estimation based on Bell’s inequalities , 2009, 0907.2170.
[50] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[51] A. J. Short,et al. Quantum nonlocality and beyond: limits from nonlocal computation. , 2007, Physical review letters.
[52] Frédéric Magniez,et al. Self-testing of Quantum Circuits , 2006, ICALP.
[53] Quaternionic quantum mechanics allows non-local boxes , 2009, 0911.1761.
[54] William Rowan Hamilton,et al. ON QUATERNIONS, OR ON A NEW SYSTEM OF IMAGINARIES IN ALGEBRA , 1847 .
[55] J. Kowski. Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .