Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau - science, 1999 - science.org
Quantum key distribution is widely thought to offer unconditional security in communication
between two users. Unfortunately, a widely accepted proof of its security in the presence of …
between two users. Unfortunately, a widely accepted proof of its security in the presence of …
Security of quantum key distribution
R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
Unconditional security in quantum cryptography
D Mayers - Journal of the ACM (JACM), 2001 - dl.acm.org
Basic techniques to prove the unconditional security of quantum crypto graphy are
described. They are applied to a quantum key distribution protocol proposed by Bennett and …
described. They are applied to a quantum key distribution protocol proposed by Bennett and …
Device-independent quantum secure direct communication against collective attacks
Abstract “Device-independent” not only represents a relaxation of the security assumptions
about the internal working of the quantum devices, but also can enhance the security of the …
about the internal working of the quantum devices, but also can enhance the security of the …
Information-theoretic security proof for quantum-key-distribution protocols
We present a technique for proving the security of quantum-key-distribution (QKD) protocols.
It is based on direct information-theoretic arguments and thus also applies if no equivalent …
It is based on direct information-theoretic arguments and thus also applies if no equivalent …
Optimal eavesdrop** in quantum cryptography. I. Information bound and optimal strategy
Abstract We consider the Bennett-Brassard cryptographic scheme, which uses two
conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits …
conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits …
Long-distance quantum key distribution secure against coherent attacks
Quantum key distribution (QKD) permits information-theoretically secure transmission of
digital encryption keys, assuming that the behavior of the devices employed for the key …
digital encryption keys, assuming that the behavior of the devices employed for the key …