Experimental quantum cryptography.

From MaRDI portal
Revision as of 11:43, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2642405

DOI10.1007/BF00191318zbMath1114.94005OpenAlexW4214950786WikidataQ55882573 ScholiaQ55882573MaRDI QIDQ2642405

Louis Salvail, François Bessette, Charles H. Bennett, Gilles Brassard, John A. Smolin

Publication date: 14 August 2007

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00191318



Related Items

Quantum cryptography and security analysis, Information theoretically secure key sharing protocol executing with constant noiseless public channels, Secrecy capacity in the four-state protocol of quantum key distribution, Asymptotically optimal prepare-measure quantum key distribution protocol, Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit, Time synchronization in satellite quantum key distribution, Unambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single Photons, The role of entanglement for enhancing the efficiency of quantum kernels towards classification, Quantum cryptography: Protecting our future networks with quantum mechanics, An efficient circle-type multiparty quantum key agreement protocol with single particles, Theoretical design of quantum memory unit for under water quantum communication using electromagnetically induced transparency protocol in ultracold 87Rb atoms, Nondeterministic noiseless amplification via non-symplectic phase space transformations, Analysis of achievable distances of BB84 and KMB09 QKD protocols, QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION, ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL, Preface, Preface, Fast quantum key distribution with decoy number states, Two efficient measurement device independent quantum dialogue protocols, Comment on “Quantum key agreement protocol”, Nature computes: Information processing in quantum dynamical systems, PT symmetric evolution, coherence and violation of Leggett–Garg inequalities, High-capacity quantum key distribution based on hyperentangled Bell states and hyper-encoding, An improved quantum key distribution protocol for verification, An enhanced quantum key distribution protocol for security authentication, Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach, Attacks on quantum key distribution protocols that employ non-ITS authentication, Production, entanglement and polarization of nonlinear excited entangled coherent states of some realizations of the \(\mathrm{SU}(1,1)\) and \(\mathrm{SU}(2)\) groups, Cryptographic encryption scheme based on metastable excited nuclei, Experimental detection of qubit-ququart pseudo-bound entanglement using three nuclear spins, Equiprobable unambiguous discrimination of quantum states by symmetric orthogonalisation, Squeezed states of light and their applications in laser interferometers, A quantum public-key cryptosystem without quantum channels between any two users based on quantum teleportation, Efficient quantum secret sharing, The Wigner function negative value domains and energy function poles of the polynomial oscillator, Quantum Key Distribution and String Oblivious Transfer in Noisy Channels, The quantum steganography protocol via quantum noisy channels, On the (im)possibility of non-interactive correlation distillation, Error correcting codes, block designs, perfect secrecy and finite fields, Single-photon sources–an introduction, Linking information reconciliation and privacy amplification, Effects of atmospheric turbulence on the single-photon receiving efficiency and the performance of quantum channel with the modified approximate elliptic-beam model assumption, A quantum secure direct communication protocol using entangled modified spin coherent states, On design of parity preserving reversible adder circuits, States that “look the same” with respect to every basis in a mutually unbiased set, Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states, Construction of the superposition of displaced Fock states and entangled displaced Fock states, Efficient quantum key distribution protocol based on classical-quantum polarized channels, Coherence-based measure of quantumness in (non-) Markovian channels, Comparative dynamical study of a bound entangled state, Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line, Improvements on: ``Multi-party quantum key agreement protocol with Bell states and single particles, Classification of the entangled states \(2 \times M \times N\), Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states, Quantum algorithm for quantum state discrimination via partial negation and weak measurement, Shannon-limit approached information reconciliation for quantum key distribution, Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue, Improving key rate of optical fiber quantum key distribution system based on channel tomography, Detector blinding attacks on counterfactual quantum key distribution, Quantum cryptography beyond quantum key distribution, Completely mixed state is a critical point for three-qubit entanglement, Quantum catalysis-based discrete modulation continuous variable quantum key distribution with eight states, Practical quantum bit commitment protocol, Quantum computation: a tutorial, A Hamiltonian for quantum copying, Coherent eavesdropping strategies for the four state quantum cryptography protocol., Teleportation of GHZ-states in QED-cavities without the explicit Bell-state measurement, The black paper of quantum cryptography: real implementation problems, Quantum key distribution using a two-way quantum channel, Non-contextual chocolate balls versus value indefinite quantum cryptography, Quantum key distribution via tripartite coherent states, Trojan horse attack free fault-tolerant quantum key distribution protocols, Quantum simultaneous secret distribution with dense coding by using cluster states, On quantum discord for analyzing decoherence effect and deformation phenomena in entangled coherent bipartite state, Generation of atomic NOON states via adiabatic passage, Security risk during the transient in a key exchange protocol using random signals and feedback, A practical protocol for three-party authenticated quantum key distribution, Security of continuous-variable measurement-device-independent quantum key distribution with imperfect state preparation, Analysis of atmospheric effects on satellite-based quantum communication: a comparative study, Computing on quantum shared secrets for general quantum access structures, Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?, Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna, Improving the discrete-modulated continuous-variable measurement-device-independent quantum key distribution with quantum scissors, Trade-off between squashed entanglement and concurrence in bipartite quantum states, Quantum Key Distribution, Adaptive Cascade, The statistical fluctuation study of quantum key distribution in means of uncertainty principle, Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol, Classification of signature-only signature models, The modeling library of eavesdropping methods in quantum cryptography protocols by model checking, Concurrence in the framework of coherent states, Conditions for separability in generalized Laplacian matrices and diagonally dominant matrices as density matrices, A fuzzy vault scheme, Language Modeling and Encryption on Packet Switched Networks, From quantum state targeting to Bell inequalities, Passive Decoy State Quantum Key Distribution, Information protection based on nanosecond synchronization of time scales in meteor burst channel, Information and computation: Classical and quantum aspects, Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams, Quantum secure direct communication with mutual authentication using a single basis, Time coding protocols for quantum key distribution, No-clone smartcard via quantum memory, Multi-bits transfer based on the quantum three-stage protocol with quantum error correction codes, Communication Using Quantum States, Quantum Oblivious Transfer, Oracle Quantum Computing, Quantum Cryptography Using Polarization Feedback, Bell's Inequality and Rejected-data Protocols for Quantum Cryptography, Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, Quantum Cryptography with Interferometric Quantum Entanglement, Quantum Cryptography with Photon Pairs, Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Why quantum bit commitment and ideal quantum coin tossing are impossible., Teleportation as a quantum computation., Quantum cryptography using any two nonorthogonal states, Quantum cryptography without Bell’s theorem, Quantum Cryptography Based on Orthogonal States, Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps, Quantum Games and Quantum Strategies, Novel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipher, Accelerated high-fidelity Bell states generation based on dissipation dynamics and Lyapunov control, Superposition of two-mode ``near coherent states: non-classicality and entanglement, Error correction in quantum cryptography based on artificial neural networks, Measurement device-independent quantum secure direct communication with user authentication, Complexity of protein folding



Cites Work