Cryptography Reference
In-Depth Information
25. P. W. Shor and J. Preskill, Simple proof of security of the bb84 quantum key
distribution protocol, Phys. Rev. Lett. , 85(2), 441-444, 2000; quant-ph/0003004.
26. K. Tamaki, M. Koashi, and N. Imoto, Unconditionally secure key distribution
based on two nonorthogonal states, Phys. Rev. Lett. , 90, 167904, 2003.
27. S. Wiesner, Conjugate coding, Sigact News , 15(1), 78-88, 1983; Originally written
c. 1970 but them unpublished.
28. A.C.-C. Yao, Security of quantum protocols against coherent measurements, in
Proceedings of the 27th ACM Symposium on the Theory of Computing , ACM Press,
1995, pp. 67-75.
29. M. Zukowski, A. Zeilinger, M. Horne, and A.K. Ekert, Event-ready detectors,
Bell experiment via entanglement swapping, Phys. Rev. Lett. , 71, 4287-4290,
1993.
30. M. Christandl, R. Renner, and A. Ekert, A generic security proof for quantum
key distribution, quant-ph/0402131.
Search WWH ::




Custom Search