Cryptography Reference
In-Depth Information
61. D.G. Enzer, P.G. Hadley, R. J. Hughes, C.G. Peterson, and P.G. Kwiat, New J.
Phys., 4, 45.1, 2002.
62. S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi and N. Gisin,
arXiv report quant-ph/0408136.
63. W. Tittel, H. Zbinden, and N. Gisin, Phys. Rev., A 63, 042301, 2001.
64. M. Zukowski, A. Zeilinger, M. Horne, and H. Weinfurter, Acta Phys. Pol., A 93,
187-195, 1998.
65. M. Hillery, V. Buzek, and A. Berthiaume, Phys. Rev., A 59, 1829-1834, 1999.
66. Grosshans F. et al., Nature, 421, 238-240, 2003.
67. B.C. Jacobs, T.B. Pittman, and J.D. Franson, Phys. Rev., A 66, 052307, 2002.
68. D. Collins, N. Gisin and H. de Riedmatten, quant-ph/0311101
69. H. Briegel, W. D ur, J. I. Cirac and P. Zoller, Phys. Rev. Lett., 81, 5932, 1998.
70. H. de Riedmatten, I. Marcikic, J.A.W. van Houwelingen, W. Tittel, H. Zbinden,
H. Gisin, LANL arXiv quant-ph/0409093.
71. A. Acin and N. Gisin, quant-ph/0310054.
72. T. Acin, N. Gisin and L. Massanes, Phys. Rev. Lett., 91, 167901, 2003.
73. N. L utkenhaus, Phys. Rev., A 61, 052304, 2000; G. Brassard, N. L utkenhaus,
T. Mor and B.C. Sanders, Phys. Rev. Lett., 85, 1330, 2000.
74. G. Brassard, N. L utkenhaus, T. Mor and B.C. Sanders, Phys. Rev. Lett., 85, 1330-
1333, 2000.
75. A. Peres, Quantum Theory: Concepts and Methods , (Kluwer, Dordrecht, 1998),
section 9-5.
76. B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev., A 51, 1863, 1995.
77. Huttner, B., J.D. Gautier, A. Muller, H. Zbinden, and N. Gisin, Phys. Rev., A 54,
3783-3789, 1996.
78. W.Y. Hwang, Phys. Rev. Lett., 91, 057901, 2003.
79. H. Weinfurter, Europhysics Lett., 25, 559-564, 1994.
80. I. Marcikic, H. de Riedmatten, W. Tittel, H. Zbinden and N. Gisin, Nature, 421,
509-513, 2003; quant-ph/0301178.
81. H. de Riedmatten, I. Marcikic, W. Tittel, H. Zbinden, D. Collins and N. Gisin,
Phys. Rev. Lett., 92, 047904, 2004; quant-ph/0309218.
82. Another illustration that research is not deterministic (even less so than
quantum physics!) is how the idea of the nowadays so called plug & play
configuration came up. During a conference in Corsica on micro-cavities I
(NG) attended, there was, as usual, a day off for tourism. The night before the
idea came, preventing me from sleeping. I skipped the tourism day and, in my
student room in Cargese, wrote the first draft of [4].
83. Note that the mode containing the photon is not a frequency mode since the
pulse has a finite spread.
84. And assuming no noise in the detectors.
85. In particular it is impossible to clone perfectly a quantum state.
86. There has been some controversy on the security of faint laser QKD and some
people claimed that it is not “unconditional security.” However, there is no
such thing as “unconditional security.” Obvious conditions for secret commu-
nication are, for instance, the clear definition of the boundaries of Alice's and
Bob'soffice and, in the case of QKD, the validity of quantum mechanics. For
well-defined conditions, Eve's information due to multiphoton pulses can be
calculated and reduced to arbitrary low values.
Search WWH ::




Custom Search