Quantum cryptography

N Gisin, G Ribordy, W Tittel, H Zbinden - Reviews of modern physics, 2002 - APS
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …

Catalysis in quantum information theory

P Lipka-Bartosik, H Wilming, NHY Ng - Reviews of Modern Physics, 2024 - APS
Catalysts open up new reaction pathways that can speed up chemical reactions while not
consuming the catalyst. A similar phenomenon has been discovered in quantum information …

Experimental quantum teleportation

D Bouwmeester, JW Pan, K Mattle, M Eibl, H Weinfurter… - Nature, 1997 - nature.com
Quantum teleportation—the transmission and reconstruction over arbitrary distances of the
state of a quantum system—is demonstrated experimentally. During teleportation, an initial …

Unconditional quantum teleportation

A Furusawa, JL Sørensen, SL Braunstein, CA Fuchs… - science, 1998 - science.org
Quantum teleportation of optical coherent states was demonstrated experimentally using
squeezed-state entanglement. The quantum nature of the achieved teleportation was …

The physics of quantum information: basic concepts

D Bouwmeester, A Zeilinger - The physics of quantum information …, 2000 - Springer
The superposition principle plays the most central role in all considerations of quantum
information, and in most of the" gedanken" experiments and even the paradoxes of quantum …

Quantum nonlocality without entanglement

CH Bennett, DP DiVincenzo, CA Fuchs, T Mor, E Rains… - Physical Review A, 1999 - APS
We exhibit an orthogonal set of product states of two three-state particles that nevertheless
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …

Optimal eavesdrop** in quantum cryptography with six states

D Bruß - Physical Review Letters, 1998 - APS
A generalization of the quantum cryptographic protocol by Bennett and Brassard is
discussed, using three conjugate bases, ie, six states. By calculating the optimal mutual …

[BOOK][B] Quantum computing

J Gruska - 1999 - fi.muni.cz
Experimentally, secure quantum key distribution has been tested, using polarization or
phase of photons, for distance of 150 (200) km using standard optical fibres and for the …

Continuous variable quantum cryptography

TC Ralph - Physical Review A, 1999 - APS
USING STANDARD PRA S Page 1 Continuous variable quantum cryptography TC Ralph*
Department of Physics, Faculty of Science, The Australian National University, ACT 0200 …

Quantum key distribution secured optical networks: A survey

P Sharma, A Agrawal, V Bhatia… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Increasing incidents of cyber attacks and evolution of quantum computing poses challenges
to secure existing information and communication technologies infrastructure. In recent …