Experimental quantum cryptography.
From MaRDI portal
Publication:2642405
DOI10.1007/BF00191318zbMath1114.94005DBLPjournals/joc/BennettBBSS92OpenAlexW4214950786WikidataQ55882573 ScholiaQ55882573MaRDI QIDQ2642405
Louis Salvail, François Bessette, Charles H. Bennett, Gilles Brassard, John A. Smolin
Publication date: 14 August 2007
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00191318
Key distributionUncertainty principleUnconditional securityQuantum cryptographyPolarized lightPrivacy amplificationPublic discussionReconciliation protocols
Related Items (only showing first 100 items - show all)
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ Production, entanglement and polarization of nonlinear excited entangled coherent states of some realizations of the \(\mathrm{SU}(1,1)\) and \(\mathrm{SU}(2)\) groups ⋮ Cryptographic encryption scheme based on metastable excited nuclei ⋮ Experimental detection of qubit-ququart pseudo-bound entanglement using three nuclear spins ⋮ Equiprobable unambiguous discrimination of quantum states by symmetric orthogonalisation ⋮ Squeezed states of light and their applications in laser interferometers ⋮ A quantum public-key cryptosystem without quantum channels between any two users based on quantum teleportation ⋮ Efficient quantum secret sharing ⋮ The Wigner function negative value domains and energy function poles of the polynomial oscillator ⋮ Quantum Key Distribution and String Oblivious Transfer in Noisy Channels ⋮ The quantum steganography protocol via quantum noisy channels ⋮ On the (im)possibility of non-interactive correlation distillation ⋮ Error correcting codes, block designs, perfect secrecy and finite fields ⋮ Single-photon sources–an introduction ⋮ Linking information reconciliation and privacy amplification ⋮ Effects of atmospheric turbulence on the single-photon receiving efficiency and the performance of quantum channel with the modified approximate elliptic-beam model assumption ⋮ A quantum secure direct communication protocol using entangled modified spin coherent states ⋮ On design of parity preserving reversible adder circuits ⋮ States that “look the same” with respect to every basis in a mutually unbiased set ⋮ Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states ⋮ Construction of the superposition of displaced Fock states and entangled displaced Fock states ⋮ Efficient quantum key distribution protocol based on classical-quantum polarized channels ⋮ Coherence-based measure of quantumness in (non-) Markovian channels ⋮ Comparative dynamical study of a bound entangled state ⋮ Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line ⋮ Improvements on: ``Multi-party quantum key agreement protocol with Bell states and single particles ⋮ Classification of the entangled states \(2 \times M \times N\) ⋮ Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states ⋮ Quantum algorithm for quantum state discrimination via partial negation and weak measurement ⋮ Shannon-limit approached information reconciliation for quantum key distribution ⋮ Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue ⋮ Improving key rate of optical fiber quantum key distribution system based on channel tomography ⋮ Detector blinding attacks on counterfactual quantum key distribution ⋮ Quantum cryptography beyond quantum key distribution ⋮ Completely mixed state is a critical point for three-qubit entanglement ⋮ Quantum catalysis-based discrete modulation continuous variable quantum key distribution with eight states ⋮ Practical quantum bit commitment protocol ⋮ Quantum computation: a tutorial ⋮ A Hamiltonian for quantum copying ⋮ Coherent eavesdropping strategies for the four state quantum cryptography protocol. ⋮ Teleportation of GHZ-states in QED-cavities without the explicit Bell-state measurement ⋮ The black paper of quantum cryptography: real implementation problems ⋮ Quantum key distribution using a two-way quantum channel ⋮ Non-contextual chocolate balls versus value indefinite quantum cryptography ⋮ Quantum key distribution via tripartite coherent states ⋮ Trojan horse attack free fault-tolerant quantum key distribution protocols ⋮ Quantum simultaneous secret distribution with dense coding by using cluster states ⋮ On quantum discord for analyzing decoherence effect and deformation phenomena in entangled coherent bipartite state ⋮ Generation of atomic NOON states via adiabatic passage ⋮ Security risk during the transient in a key exchange protocol using random signals and feedback ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Security of continuous-variable measurement-device-independent quantum key distribution with imperfect state preparation ⋮ Analysis of atmospheric effects on satellite-based quantum communication: a comparative study ⋮ Computing on quantum shared secrets for general quantum access structures ⋮ Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure? ⋮ Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna ⋮ Improving the discrete-modulated continuous-variable measurement-device-independent quantum key distribution with quantum scissors ⋮ Trade-off between squashed entanglement and concurrence in bipartite quantum states ⋮ Quantum Key Distribution ⋮ Adaptive Cascade ⋮ The statistical fluctuation study of quantum key distribution in means of uncertainty principle ⋮ Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol ⋮ Classification of signature-only signature models ⋮ The modeling library of eavesdropping methods in quantum cryptography protocols by model checking ⋮ Concurrence in the framework of coherent states ⋮ Conditions for separability in generalized Laplacian matrices and diagonally dominant matrices as density matrices ⋮ A fuzzy vault scheme ⋮ Language Modeling and Encryption on Packet Switched Networks ⋮ From quantum state targeting to Bell inequalities ⋮ Passive Decoy State Quantum Key Distribution ⋮ Information protection based on nanosecond synchronization of time scales in meteor burst channel ⋮ Information and computation: Classical and quantum aspects ⋮ Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams ⋮ Quantum secure direct communication with mutual authentication using a single basis ⋮ Time coding protocols for quantum key distribution ⋮ No-clone smartcard via quantum memory ⋮ Multi-bits transfer based on the quantum three-stage protocol with quantum error correction codes ⋮ Communication Using Quantum States ⋮ Quantum Oblivious Transfer ⋮ Oracle Quantum Computing ⋮ Quantum Cryptography Using Polarization Feedback ⋮ Bell's Inequality and Rejected-data Protocols for Quantum Cryptography ⋮ Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system ⋮ Quantum Cryptography with Interferometric Quantum Entanglement ⋮ Quantum Cryptography with Photon Pairs ⋮ Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states ⋮ Why quantum bit commitment and ideal quantum coin tossing are impossible. ⋮ Teleportation as a quantum computation. ⋮ Quantum cryptography using any two nonorthogonal states ⋮ Quantum cryptography without Bell’s theorem ⋮ Quantum Cryptography Based on Orthogonal States ⋮ Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps ⋮ Quantum Games and Quantum Strategies ⋮ Novel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipher ⋮ Accelerated high-fidelity Bell states generation based on dissipation dynamics and Lyapunov control ⋮ Superposition of two-mode ``near coherent states: non-classicality and entanglement ⋮ Error correction in quantum cryptography based on artificial neural networks ⋮ Measurement device-independent quantum secure direct communication with user authentication ⋮ Complexity of protein folding
Cites Work
- Unnamed Item
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Modern cryptology. A tutorial
- An Update on Quantum Cryptography
- Privacy Amplification by Public Discussion
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography without Bell’s theorem
- Cryptanalysis: a survey of recent results
- Generalized privacy amplification
This page was built for publication: Experimental quantum cryptography.