Experimental quantum cryptography.

From MaRDI portal
Publication:2642405


DOI10.1007/BF00191318zbMath1114.94005WikidataQ55882573 ScholiaQ55882573MaRDI QIDQ2642405

Gilles Brassard, Louis Salvail, Charles H. Bennett, John A. Smolin, François Bessette

Publication date: 14 August 2007

Published in: Journal of Cryptology (Search for Journal in Brave)


81P68: Quantum computation

94A60: Cryptography


Related Items

Communication Using Quantum States, Quantum Oblivious Transfer, Oracle Quantum Computing, Quantum Cryptography Using Polarization Feedback, Bell's Inequality and Rejected-data Protocols for Quantum Cryptography, Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, Quantum Cryptography with Interferometric Quantum Entanglement, Quantum Cryptography with Photon Pairs, Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Quantum cryptography using any two nonorthogonal states, Quantum cryptography without Bell’s theorem, Quantum Cryptography Based on Orthogonal States, Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps, Quantum Games and Quantum Strategies, Secrecy capacity in the four-state protocol of quantum key distribution, ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL, Fast quantum key distribution with decoy number states, QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION, Error correcting codes, block designs, perfect secrecy and finite fields, Teleportation of GHZ-states in QED-cavities without the explicit Bell-state measurement, Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?, Classification of signature-only signature models, Information protection based on nanosecond synchronization of time scales in meteor burst channel, Complexity of protein folding, Linking information reconciliation and privacy amplification, No-clone smartcard via quantum memory, Why quantum bit commitment and ideal quantum coin tossing are impossible., Teleportation as a quantum computation., A Hamiltonian for quantum copying, Coherent eavesdropping strategies for the four state quantum cryptography protocol., On the (im)possibility of non-interactive correlation distillation, A fuzzy vault scheme, From quantum state targeting to Bell inequalities, Language Modeling and Encryption on Packet Switched Networks



Cites Work