| related words |
| bobs |
| charlie |
| sends |
| share |
| secret |
| eavesdropping |
| shared |
| parties |
| message |
| sharing |
| performs |
| prepares |
| teleport |
| knows |
| conclusive |
| communicate |
| sender |
| eavesdropper |
| receives |
| teleported |
|
| related documents |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
| Efficient many-party controlled teleportation of multi-qubit quantum
information via entanglement [0402138v2] |
| Elliptic Rydberg states as direction indicators [0305171v1] |
| The Grammar of Teleportation [0509048v1] |
| Limits on Efficient Computation in the Physical World [0412143v2] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Implications of Teleportation for Nonlocality [0103105v2] |
| Synchronizing quantum clocks with classical one-way communication:
Bounds on the generated entropy [0306023v1] |
| Eavesdropping on the "ping-pong" type quantum communication protocols
with invisible photon [0508002v2] |
| Classical Communication via the Einstein-Podolsky-Rosen Channel Alone: A
Proposed Experimental Test [0109148v1] |
| QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols [0510230v3] |
| Unconditionally Secure Quantum Coin Tossing via Entanglement Swapping [0012139v2] |
| Experimental Realization of Teleporting an Unknown Pure Quantum State
via Dual Classical and Einstein-Podolski-Rosen Channels [9710013v1] |
| Distinguishing a set of full product bases needs only projective
measurements and classical communication [0311154v2] |
| Teleportation via generalized measurements, and conclusive teleportation [9906039v1] |
| Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
| Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
| Correct mutual information, quantum bit error rate and secure
transmission efficiency in Wojcik's eavesdropping scheme on ping-pong
protocol [0402099v1] |
| Quantum Digital Signatures [0105032v2] |
|
| related topics |
| {alice, bob, state} |
| {key, protocol, security} |
| {algorithm, log, probability} |
| {theory, mechanics, state} |
| {state, states, entangled} |
| {information, entropy, channel} |
| {bell, inequality, local} |
| {photon, photons, single} |
| {entanglement, phys, rev} |
| {time, systems, information} |
| {particle, mechanics, theory} |
| {error, code, errors} |
| {let, theorem, proof} |
| {cos, sin, state} |
| {states, state, optimal} |
| {vol, operators, histories} |
| {measurement, state, measurements} |
| {state, phys, rev} |
| {wave, scattering, interference} |
| {qubit, qubits, gate} |
|