Cryptography Reference
In-Depth Information
References
1. C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental
quantum cryptography, J. Cryptology , 5, 3, 1992; C.H. Bennett, G. Brassard, and
A. Ekert, Quantum cryptography, Sci. Am. , 267, 50, 1992.
2. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Rev.
Mod. Phys. , 74, 145, 2002.
3. G. Brassard, N. L utkenhaus, T. Mor, and B. C. Sanders, Limitations on practical
quantum cryptography, Phys. Rev. Lett. , 85, 1330, 2000.
4. D. Mayers, Unconditional security in quantum cryptography, quant-
ph/9802025 1998; P. W. Shor and J. Preskill, Simple proof of security of the
BB84 quantum key distribution protocol, quant-ph/0003004, 2000.
5. H. Inamori, N. L utkenhaus, and D. Mayers, Unconditional security of practical
quantum key distribution, quant-ph/0107017 2001; N. L utkenhaus, Security
against eavesdropping in quantum cryptography, Phys. Rev. , A 54, 97, 200,
1996.
6. C.A. Fuchs, Just two nonorthogonal quantum states, in Proceedings of the Fourth
International Conference on Quantum Communication, Measurement, and Comput-
ing, 1998 , G.T. Moore and M. O. Scully, eds., Kluwer Academic, 2000, p. 11.
7. C.H. Bennett, Quantum cryptography using any two nonorthogonal states,
Phys. Rev. Lett. , 68, 3121, 1992.
8. B. Huttner, N. Imoto, N. Gisin, and T. Mor, Quantum cryptography with co-
herent states, Phys. Rev. , A 51, 1863, 1995.
9. A. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. , 67,
661, 1991.
10. T.C. Ralph, Continuous variable quantum cryptography, Phys. Rev. , A 61,
010303, 1999; T.C. Ralph, Security of continuous-variable quantum cryptog-
raphy, Phys. Rev. , A 62, 062306, 2000.
11. M. Hillery, Quantum cryptography with squeezed states, Phys. Rev. , A 61,
022309, 2000; N.J. Cerf, M. Levy, and G. Van Assche, Quantum distribution
of Gaussian keys using squeezed states, Phys. Rev. , A 63, 052311, 2001.
12. M.D. Reid, Quantum cryptography with a predetermined key, using
continuous-variable Einstein-Podolsky-Rosen correlations, Phys. Rev. , A 62,
062308, 2000.
13. D. Gottesman and J. Preskill, Secure quantum key distribution using squeezed
states, Phys. Rev. , A 63, 022309, 2001.
14. S. Lorenz, Ch. Silberhorn, N. Korolkova, R.S. Windeler, and G. Leuchs,
Squeezed light from microstructured fibres: towards free space quantum cryp-
tography, Appl. Phys. , B 73, 855, 2001.
15. Ch. Silberhorn, N. Korolkova, and G. Leuchs, Quantum key distribution with
bright entangled beams, Phys. Rev. Lett. , 88, 167902, 2002.
16. M.G. Raymer and A.C. Funk, Quantum key distribution using nonclassical
photon-number correlations in macroscopic light pulses, Phys. Rev. , A 63,
022309, 2001.
17. K. Bencheikh, T. Symul, A. Jankovic, and J. A. Levenson, Quantum key distri-
bution with continuous variables, J. Mod. Opt. , 48, 1903, 2001.
18. F. Grosshans, P. Grangier, Continuous variable quantum cryptography using
coherent states, Phys. Rev. Lett. , 88, 057902, 2002.
19. T. Hirano, H. Yamanaka, M. Ashikaga, T. Konishi, and R. Namiki, Quantum
cryptography using pulsed homodyne detection, Phys. Rev. , A 68, 042331, 2003
and quant-ph/0008037, 2000.
Search WWH ::




Custom Search