Cryptography Reference
In-Depth Information
25. P. W. Shor and J. Preskill, Simple proof of security of the bb84 quantum key
distribution protocol,
Phys. Rev. Lett.
, 85(2), 441-444, 2000; quant-ph/0003004.
26. K. Tamaki, M. Koashi, and N. Imoto, Unconditionally secure key distribution
based on two nonorthogonal states,
Phys. Rev. Lett.
, 90, 167904, 2003.
27. S. Wiesner, Conjugate coding,
Sigact News
, 15(1), 78-88, 1983; Originally written
c. 1970 but them unpublished.
28. A.C.-C. Yao, Security of quantum protocols against coherent measurements, in
Proceedings of the 27th ACM Symposium on the Theory of Computing
, ACM Press,
1995, pp. 67-75.
29. M. Zukowski, A. Zeilinger, M. Horne, and A.K. Ekert, Event-ready detectors,
Bell experiment via entanglement swapping,
Phys. Rev. Lett.
, 71, 4287-4290,
1993.
30. M. Christandl, R. Renner, and A. Ekert, A generic security proof for quantum
key distribution, quant-ph/0402131.