| related words |
| unassisted |
| slepian |
| breeding |
| achievability |
| sealing |
| cheaters |
| password |
| nordholt |
| authenticate |
| cheater |
| tamaki |
| committing |
| mother |
| attacker |
| shields |
| sifting |
| intercepted |
| vernam |
| partys |
| cheats |
|
| related documents |
| An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
| Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
| Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
| Why the quantum? [0402149v1] |
| Distinguishability and Accessible Information in Quantum Theory [9601020v1] |
| Cheat Sensitive Quantum Bit Commitment [9911043v5] |
| Universally composable privacy amplification against quantum adversaries [0403133v2] |
| A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
| Strategies for Real-Time Position Control of a Single Atom in Cavity QED [0507064v1] |
|
| related topics |
| {key, protocol, security} |
| {vol, operators, histories} |
| {cavity, atom, atoms} |
| {theory, mechanics, state} |
| {alice, bob, state} |
| {observables, space, algebra} |
| {measurement, state, measurements} |
| {particle, mechanics, theory} |
| {photon, photons, single} |
| {level, atom, field} |
| {information, entropy, channel} |
| {state, phys, rev} |
| {light, field, probe} |
| {classical, space, random} |
| {state, states, entangled} |
| {bell, inequality, local} |
| {let, theorem, proof} |
| {algorithm, log, probability} |
| {error, code, errors} |
| {states, state, optimal} |
|