Unconditional security of practical quantum key distribution

Hitoshi Inamori1, Norbert Lütkenhaus2, Dominic Mayers3
1Centre for Quantum Computation, Clarendon Laboratory, Oxford, UK
2Helsinki Institute of Physics, Helsinki, Finland
3Computer Science Department, Maharishi University of Management, NEC Research Institute, Princeton, NJ, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

H. Inamori, N. Lütkenhaus, D. Mayers, Inconditional Security for Practical Quantum Key Distribution, arXiv:quant-ph/0107017 (2001)

D. Mayers, Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology  —  Proceedings of Crypto '96; available as arXiv:quant-ph/9606003 (Springer, Berlin, 1996), pp. 343–357

D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025

B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev. A 51, 1863 (1995)

H.P. Yuen, Quantum Semiclassic. Opt. 8, 939 (1996)

G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Phys. Rev. Lett. 85, 1330 (2000)

N. Lütkenhaus, Phys. Rev. A 61, 052304 (2000)

E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, A proof of the security of quantum key distribution, arXiv:quant-ph/9912053 (1999)

P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)

B. Huttner, A. Ekert, J. Mod. Opt. 41, 2455 (1994); C. Fuchs, N. Gisin, R. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997); B. Slutsky, R. Rao, P. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998); N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999)

J. Cirac, N. Gisin, Phys. Lett. A 229, 1 (1997); H. Bechmann-Pasquinucci, N. Gisin, Phys. Rev. A 59, 4238 (1999)

E. Biham, T. Mor, Phys. Rev. Lett. 78, 2256 (1997); E. Biham, M. Boyer, G. Brassard, J. van de Graaf, T. Mor, arXiv:quant-ph/9801022 (1998)

H.-K. Lo, H.F. Chau. Science 283, 2050 (1999)

D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998);

D. Mayers, C. Tourenne, “Violation of Locality and Self-Checking Source”, to appear in: Proceedings of Quantum Communication, Computing, and Measurement 3, held in Capri 2000 (Kluwer Academic/Plenum Publishers)

C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949)

D. Welsh, Code and Cryptography (Clarendon Press, Oxford, 1988)

D. Stinson, Cryptography: Theory and Practice (CRC Press, 1995)

C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179

C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. J. Cryptology 5, 3 (1992)

D.F. Walls, G.J. Milburn, Quantum Optics (Springer, Berlin, 1994)

M. Bourennane, F. Gibson, A. Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Opt. Expr. 4, 383 (1999)

C. Marand, P.T. Townsend, Opt. Lett. 20, 1695 (1995)

P.D. Townsend, IEEE Photon. Technol. Lett. 10, 1048 (1998)

A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993)

Lectures on Communication Theory by D. Welsh, C. McDiarmid, Mathematical Institute, Oxford (1998)