Experimental quantum cryptography.

From MaRDI portal
Revision as of 10:43, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2642405

DOI10.1007/BF00191318zbMath1114.94005DBLPjournals/joc/BennettBBSS92OpenAlexW4214950786WikidataQ55882573 ScholiaQ55882573MaRDI QIDQ2642405

Louis Salvail, François Bessette, Charles H. Bennett, Gilles Brassard, John A. Smolin

Publication date: 14 August 2007

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00191318






Related Items (only showing first 100 items - show all)

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approachAttacks on quantum key distribution protocols that employ non-ITS authenticationProduction, entanglement and polarization of nonlinear excited entangled coherent states of some realizations of the \(\mathrm{SU}(1,1)\) and \(\mathrm{SU}(2)\) groupsCryptographic encryption scheme based on metastable excited nucleiExperimental detection of qubit-ququart pseudo-bound entanglement using three nuclear spinsEquiprobable unambiguous discrimination of quantum states by symmetric orthogonalisationSqueezed states of light and their applications in laser interferometersA quantum public-key cryptosystem without quantum channels between any two users based on quantum teleportationEfficient quantum secret sharingThe Wigner function negative value domains and energy function poles of the polynomial oscillatorQuantum Key Distribution and String Oblivious Transfer in Noisy ChannelsThe quantum steganography protocol via quantum noisy channelsOn the (im)possibility of non-interactive correlation distillationError correcting codes, block designs, perfect secrecy and finite fieldsSingle-photon sources–an introductionLinking information reconciliation and privacy amplificationEffects of atmospheric turbulence on the single-photon receiving efficiency and the performance of quantum channel with the modified approximate elliptic-beam model assumptionA quantum secure direct communication protocol using entangled modified spin coherent statesOn design of parity preserving reversible adder circuitsStates that “look the same” with respect to every basis in a mutually unbiased setCryptanalysis on authenticated semi-quantum key distribution protocol using Bell statesConstruction of the superposition of displaced Fock states and entangled displaced Fock statesEfficient quantum key distribution protocol based on classical-quantum polarized channelsCoherence-based measure of quantumness in (non-) Markovian channelsComparative dynamical study of a bound entangled stateTwo-way deterministic quantum key distribution against passive detector side channel attacks in the forward lineImprovements on: ``Multi-party quantum key agreement protocol with Bell states and single particlesClassification of the entangled states \(2 \times M \times N\)Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit statesQuantum algorithm for quantum state discrimination via partial negation and weak measurementShannon-limit approached information reconciliation for quantum key distributionSemi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogueImproving key rate of optical fiber quantum key distribution system based on channel tomographyDetector blinding attacks on counterfactual quantum key distributionQuantum cryptography beyond quantum key distributionCompletely mixed state is a critical point for three-qubit entanglementQuantum catalysis-based discrete modulation continuous variable quantum key distribution with eight statesPractical quantum bit commitment protocolQuantum computation: a tutorialA Hamiltonian for quantum copyingCoherent eavesdropping strategies for the four state quantum cryptography protocol.Teleportation of GHZ-states in QED-cavities without the explicit Bell-state measurementThe black paper of quantum cryptography: real implementation problemsQuantum key distribution using a two-way quantum channelNon-contextual chocolate balls versus value indefinite quantum cryptographyQuantum key distribution via tripartite coherent statesTrojan horse attack free fault-tolerant quantum key distribution protocolsQuantum simultaneous secret distribution with dense coding by using cluster statesOn quantum discord for analyzing decoherence effect and deformation phenomena in entangled coherent bipartite stateGeneration of atomic NOON states via adiabatic passageSecurity risk during the transient in a key exchange protocol using random signals and feedbackA practical protocol for three-party authenticated quantum key distributionSecurity of continuous-variable measurement-device-independent quantum key distribution with imperfect state preparationAnalysis of atmospheric effects on satellite-based quantum communication: a comparative studyComputing on quantum shared secrets for general quantum access structuresResponse to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaImproving the discrete-modulated continuous-variable measurement-device-independent quantum key distribution with quantum scissorsTrade-off between squashed entanglement and concurrence in bipartite quantum statesQuantum Key DistributionAdaptive CascadeThe statistical fluctuation study of quantum key distribution in means of uncertainty principleKak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocolClassification of signature-only signature modelsThe modeling library of eavesdropping methods in quantum cryptography protocols by model checkingConcurrence in the framework of coherent statesConditions for separability in generalized Laplacian matrices and diagonally dominant matrices as density matricesA fuzzy vault schemeLanguage Modeling and Encryption on Packet Switched NetworksFrom quantum state targeting to Bell inequalitiesPassive Decoy State Quantum Key DistributionInformation protection based on nanosecond synchronization of time scales in meteor burst channelInformation and computation: Classical and quantum aspectsSpeech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreamsQuantum secure direct communication with mutual authentication using a single basisTime coding protocols for quantum key distributionNo-clone smartcard via quantum memoryMulti-bits transfer based on the quantum three-stage protocol with quantum error correction codesCommunication Using Quantum StatesQuantum Oblivious TransferOracle Quantum ComputingQuantum Cryptography Using Polarization FeedbackBell's Inequality and Rejected-data Protocols for Quantum CryptographyEffect of channel imperfection on the secrecy capacity of a quantum cryptographic systemQuantum Cryptography with Interferometric Quantum EntanglementQuantum Cryptography with Photon PairsCommunication via one- and two-particle operators on Einstein-Podolsky-Rosen statesWhy quantum bit commitment and ideal quantum coin tossing are impossible.Teleportation as a quantum computation.Quantum cryptography using any two nonorthogonal statesQuantum cryptography without Bell’s theoremQuantum Cryptography Based on Orthogonal StatesQuantum Cryptography Based on Split Transmission of One-Bit Information in Two StepsQuantum Games and Quantum StrategiesNovel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipherAccelerated high-fidelity Bell states generation based on dissipation dynamics and Lyapunov controlSuperposition of two-mode ``near coherent states: non-classicality and entanglementError correction in quantum cryptography based on artificial neural networksMeasurement device-independent quantum secure direct communication with user authenticationComplexity of protein folding




Cites Work




This page was built for publication: Experimental quantum cryptography.