Experimental quantum cryptography.
From MaRDI portal
Publication:2642405
DOI10.1007/BF00191318zbMath1114.94005WikidataQ55882573 ScholiaQ55882573MaRDI QIDQ2642405
Gilles Brassard, Louis Salvail, Charles H. Bennett, John A. Smolin, François Bessette
Publication date: 14 August 2007
Published in: Journal of Cryptology (Search for Journal in Brave)
Key distribution; Uncertainty principle; Unconditional security; Quantum cryptography; Polarized light; Privacy amplification; Public discussion; Reconciliation protocols
Related Items
Communication Using Quantum States, Quantum Oblivious Transfer, Oracle Quantum Computing, Quantum Cryptography Using Polarization Feedback, Bell's Inequality and Rejected-data Protocols for Quantum Cryptography, Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, Quantum Cryptography with Interferometric Quantum Entanglement, Quantum Cryptography with Photon Pairs, Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Quantum cryptography using any two nonorthogonal states, Quantum cryptography without Bell’s theorem, Quantum Cryptography Based on Orthogonal States, Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps, Quantum Games and Quantum Strategies, Secrecy capacity in the four-state protocol of quantum key distribution, ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL, Fast quantum key distribution with decoy number states, QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION, Error correcting codes, block designs, perfect secrecy and finite fields, Teleportation of GHZ-states in QED-cavities without the explicit Bell-state measurement, Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?, Classification of signature-only signature models, Information protection based on nanosecond synchronization of time scales in meteor burst channel, Complexity of protein folding, Linking information reconciliation and privacy amplification, No-clone smartcard via quantum memory, Why quantum bit commitment and ideal quantum coin tossing are impossible., Teleportation as a quantum computation., A Hamiltonian for quantum copying, Coherent eavesdropping strategies for the four state quantum cryptography protocol., On the (im)possibility of non-interactive correlation distillation, A fuzzy vault scheme, From quantum state targeting to Bell inequalities, Language Modeling and Encryption on Packet Switched Networks
Cites Work
- Unnamed Item
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Modern cryptology. A tutorial
- An Update on Quantum Cryptography
- Privacy Amplification by Public Discussion
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography without Bell’s theorem
- Cryptanalysis: a survey of recent results
- Generalized privacy amplification