Cryptography Reference
In-Depth Information
4. M. Ben-Or, Simple security proof for quantum key distribution. On-line pre-
sentation available at http://www.msri.org/publications/ln/msri/2002/
qip/ben-or/1/index.html.
5. C.H. Bennett and G. Brassard, Quantum cryptography, public key distribution
and coin tossing, in Proceedings of International Conference on Computer Systems
and Signal Processing , IEEE, 1984, p. 175.
6. C.H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, Generalized privacy
amplification, IEEE Trans. Inf. Theory , 41(6), 1915-1923, 1995.
7. C.H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public
discusion. SIAM Journal on Computing , 17(2), 210-229, 1988.
8. E. Biham, M. Boyer, P.O. Boykin, T. Mor, and V. Roychowdhury, A proof of the
security of quantum key distribution, in Proceedings of the Thirty-Second Annual
ACM Symposium on Theory of Computing (STOC) , ACM Press, New York, 2000,
p. 715. quant-ph/9912053.
9. D. Bohm, Quantum Theory , New York: Prentice Hall, 1951.
10. D. Bruss, M. Christandl, A. Ekert, B.-G. Englert, D. Kaszlikowski, and C. Mac-
chiavello, Tomographic quantum cryptography: equivalence of quantum and
classical key distillation, Phys. Rev. Lett. , 91, 097901, 2003. quant-ph/0303184.
11. J.F. Clauser, M.A. Horne, A. Shimony, and R.A. Holt, Phys. Rev. Lett. , 23, 880,
1969.
12. D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera,
Quantum privacy amplification and the security of quantum cryptography
over noisy channels, Phys. Rev. Lett. , 77, 2818-2821, 1996. Erratum, ibid., 80,
2022-2022, 1998, quant-ph/9604039.
13. W. Diffie and M.E Hellman, IEEE Trans. Inf. Theory , IT-22, 644, 1976.
14. W. D ur, H.-J. Briegel, J.I. Cirac, and P. Zoller, Quantum repeaters based on
entanglement purification, Phys. Rev. A , 59, 169-181, 1999.
15. A. Einstein, B. Podolsky, and N. Rosen, Can quantum-mechanical description
of physical reality be considered complete? Phys. Rev. , 47, 777, 1935.
16. A. K. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. ,
67(6), 661, 1991.
17. A.K. Ekert and B. Huttner, Eavesdropping techniques in quantum cryptosys-
tems, Journal of Modern Optics , 41, 2455-2466, 1994. Special issue on Quantum
Communication.
18. N. Gisin and S. Wolf, in Advances in Cryptology — CRYPTO'00 , Lecture Notes
in Computer Science, Springer-Verlag, 2000, pp. 482-500.
19. S. Goldwasser, ed., Proceedings of the 35th Annual Symposium on the Foundations
of Computer Science , IEEE Computer Society Press, Los Alamitos, CA, 1994.
20. D. Gottesmann and H.-K. Lo., Proof of security of quantum key distribution
with two-way classical communication, IEEE Trans. Inf. Theory , 49(2), 457-475,
2003, quant-ph/0105121.
21. H.
Inamori,
Security
of
EPR-based
quantum
key
distribution,
quant-
ph/0008064.
22. H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution
over arbitrarily long distances, Science , 283(5410), 2050-2056, 1999.
23. D.
Mayers,
Unconditional
security
in
quantum
cryptography,
quant-
ph/9802025, 1998.
24. R. Rivest, A. Shamir, and L. Adleman, On digital signatures and public-key
cryptosystems, Technical Report MIT/LCS/TR-212, MIT Laboratory for Com-
puter Science, January 1979.
Search WWH ::




Custom Search