Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Quantum nonlocality without entanglement
We exhibit an orthogonal set of product states of two three-state particles that nevertheless
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …
Quantum cloning machines and the applications
No-cloning theorem is fundamental for quantum mechanics and for quantum information
science that states an unknown quantum state cannot be cloned perfectly. However, we can …
science that states an unknown quantum state cannot be cloned perfectly. However, we can …
Quantum key distribution in the Holevo limit
A Cabello - Physical Review Letters, 2000 - APS
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for
quantum key distribution, E, defined as the number of secret (ie, allowing eavesdrop** …
quantum key distribution, E, defined as the number of secret (ie, allowing eavesdrop** …
Quantum key distribution with classical Bob
M Boyer, D Kenigsberg, T Mor - 2007 First International …, 2007 - ieeexplore.ieee.org
Secure key distribution among two remote parties is impossible when both are classical,
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …
Semiquantum key distribution
Secure key distribution between two remote parties is impossible when both are classical,
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …
Deterministic secure communication without using entanglement
C Qing-Yu, L Bai-Wen - Chinese Physics Letters, 2004 - iopscience.iop.org
Deterministic Secure Communication Without Using Entanglement Page 1 Chinese Physics
Letters Deterministic Secure Communication Without Using Entanglement To cite this article …
Letters Deterministic Secure Communication Without Using Entanglement To cite this article …
Counterfactual quantum cryptography
TG Noh - Physical review letters, 2009 - APS
Quantum cryptography allows one to distribute a secret key between two remote parties
using the fundamental principles of quantum mechanics. The well-known established …
using the fundamental principles of quantum mechanics. The well-known established …
Optimal cloning of pure states, testing single clones
M Keyl, RF Werner - Journal of Mathematical Physics, 1999 - pubs.aip.org
We consider quantum devices for turning a finite number N of d-level quantum systems in
the same unknown pure state σ into M> N systems of the same kind, in an approximation of …
the same unknown pure state σ into M> N systems of the same kind, in an approximation of …
Semiquantum-key distribution using less than four quantum states
X Zou, D Qiu, L Li, L Wu, L Li - Physical Review A—Atomic, Molecular, and …, 2009 - APS
Recently Boyer [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key
distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key …
distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key …