| related words |
| knows |
| wishes |
| communicate |
| possession |
| communicating |
| publicly |
| receiving |
| prepares |
| announces |
| receivers |
| receive |
| participants |
| announce |
| wants |
| remained |
| dishonest |
| bangalore |
| securely |
| multiparty |
| wiesner |
|
| related documents |
| Improving the security of multiparty quantum secret splitting and
quantum state sharing [0605064v1] |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen
Pairs [0504120v2] |
| Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
| Limits on Efficient Computation in the Physical World [0412143v2] |
| Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
| Quantum algorithms for a set of group theoretic problems [0408150v2] |
| Geometric phases, gauge symmetries and ray representation [0605081v3] |
| Simple security proof of quantum key distribution via uncertainty
principle [0505108v1] |
| Experimental investigation of quantum key distribution with position and
momentum of photon pairs [0411183v2] |
| Communicating Quantum Processes [0409052v1] |
| Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
| Teleportation via generalized measurements, and conclusive teleportation [9906039v1] |
| Improving the security of secure direct communication based on secret
transmitting order of particles [0612016v1] |
| Quantum Gambling Using Two Nonorthogonal States [0010103v5] |
| Nonlocality and entanglement in a strange system [0607210v5] |
| New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1] |
| Security of Quantum Key Distribution Against All Collective Attacks [9801022v1] |
| Quantum cryptography with a predetermined key, using continuous variable
Einstein-Podolsky-Rosen correlations [9909030v2] |
| Eavesdropping on the "ping-pong" type quantum communication protocols
with invisible photon [0508002v2] |
|
| related topics |
| {alice, bob, state} |
| {key, protocol, security} |
| {phase, path, phys} |
| {algorithm, log, probability} |
| {theory, mechanics, state} |
| {states, state, optimal} |
| {time, wave, function} |
| {vol, operators, histories} |
| {particle, mechanics, theory} |
| {state, states, entangled} |
| {state, phys, rev} |
| {measurement, state, measurements} |
| {equation, function, exp} |
| {time, decoherence, evolution} |
| {energy, gaussian, time} |
| {bell, inequality, local} |
| {cos, sin, state} |
| {error, code, errors} |
| {state, algorithm, problem} |
| {let, theorem, proof} |
|