related documents |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
On quantum and approximate privacy [0110038v3] |
Quantum Digital Signatures [0105032v2] |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
Unifying classical and quantum key distillation [0608199v3] |
Experimentally realizable quantum comparison of coherent states and its
applications [0601130v2] |
Security of classical noise-based cryptography [0002044v2] |
Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Quantum protocols for anonymous voting and surveying [0504161v2] |
Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
Method for decoupling error correction from privacy amplification [0201030v1] |
Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution [0302033v2] |
Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
Security of quantum key distribution protocol with two-way classical
communication assisted by one-time pad encryption [0608030v3] |
Anonymous-key quantum cryptography and unconditionally secure quantum
bit commitment [0009113v1] |
A simple proof of the unconditional security of quantum key distribution [9904091v1] |
Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
Universally composable privacy amplification against quantum adversaries [0403133v2] |
From quantum-codemaking to quantum code-breaking [9703035v1] |
Coin Tossing is Strictly Weaker Than Bit Commitment [9810067v3] |
Randomizing quantum states: Constructions and applications [0307104v3] |
Secure Communication Using Qubits [0503157v1] |
Cheat Sensitive Quantum Bit Commitment [9911043v5] |
Interaction in Quantum Communication [0603135v1] |
Experimental Quantum Key Distribution with Decoy States [0503192v4] |
Simple security proof of quantum key distribution via uncertainty
principle [0505108v1] |
Error Filtration and Entanglement Purification for Quantum Communication [0407021v1] |
Quantum and Classical Noise in Practical Quantum Cryptography Systems
based on polarization-entangled photons [0205142v2] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
How much security does Y-00 protocol provide us ? [0310168v2] |
Security of quantum key distribution using d-level systems [0107130v1] |
Communicating Quantum Processes [0409052v1] |
Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
On the reversible extraction of classical information from a quantum
source [0011072v2] |
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
BDSW protocol revisited: an efficient method for the key distillation
without classical computational complexity [0409099v2] |
An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
Limits and restrictions of private quantum channel [0506107v1] |
Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
Dilemma that cannot be resolved by biased quantum coin flipping [0703099v5] |
Practical Scheme To Share A Secret Key Through An Up To 27.6% Bit Error
Rate Quantum Channel [0205060v3] |
Quantum cryptography with continuous alphabet [0304035v1] |
Symmetry implies independence [0703069v1] |
Quantum seals [0410017v2] |
Improvement of quantum key distribution protocols [9810021v1] |
Private Quantum Channels and the Cost of Randomizing Quantum Information [0003101v2] |
Why the quantum? [0402149v1] |
A Modified Wigner's Inequality for Secure Quantum Key Distribution [0302196v1] |
Security of Quantum Key Distribution Against All Collective Attacks [9801022v1] |
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1] |
Secure key from bound entanglement [0309110v2] |
Security Trade-offs in Ancilla-Free Quantum Bit Commitment in the
Presence of Superselection Rules [0405111v2] |
Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
Time reversal and exchange symmetries of unitary gate capacities [0511219v3] |
Quantum authentication protocol [0001046v1] |
Two qubit copying machine for economical quantum eavesdropping [9810008v2] |
Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
The effect of multi-pair signal states in quantum cryptography with
entangled photons [0011007v1] |
Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed
States [0611145v1] |
Quantum cryptography with a predetermined key, using continuous variable
Einstein-Podolsky-Rosen correlations [9909030v2] |
New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1] |
Experimental requirements for quantum communication complexity protocols [0009014v1] |
Tomographic Quantum Cryptography: Equivalence of Quantum and Classical
Key Distillation [0303184v1] |
Quantum channel based on correlated twin laser beams [0407175v1] |
Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
A feasible quantum communication complexity protocol [0106121v2] |
Quantum Theory and Classical Information [0202119v2] |
Application of the Discrete Quantum - Classical System to the
Information Transfer [9710037v1] |
Quantum Key Distribution with vacuum--one-photon entangled states [0504150v2] |
Invertible Quantum Operations and Perfect Encryption of Quantum States [0605041v4] |
Universal Quantum Information Compression [9805017v1] |
Improving the security of secure direct communication based on secret
transmitting order of particles [0612016v1] |
A family of quantum protocols [0308044v2] |
A dynamical model for quantum memory channels [0509016v2] |
Expanded Conclusive Eavesdropping in Quantum Key Distribution [0509211v1] |
Experimental Quantum Cryptography with Qutrits [0511163v2] |
Quantum cloning with continuous variables [0210061v1] |
Improved Lower Bounds for Locally Decodable Codes and Private
Information Retrieval [0403140v2] |
Experimental investigation of quantum key distribution with position and
momentum of photon pairs [0411183v2] |
Quantum key distribution network with wavelength addressing [0610096v2] |
Unconditionally Secure Quantum Coin Tossing via Entanglement Swapping [0012139v2] |
Classical feedback for quantum channels [0409207v3] |
Binary optical communication in single-mode and entangled quantum noisy
channels [0309096v2] |
Deterministic secure communication protocol without using entanglement [0304141v3] |
Single photon generation by pulsed excitation of a single dipole [0007037v1] |
Criteria for unconditional entanglement purification [0403058v4] |
Quantum information is incompressible without errors [0203045v1] |
Quantum Gambling Using Two Nonorthogonal States [0010103v5] |
Privacy of a lossy bosonic memory channel [0603024v2] |
Multi-Party Pseudo-Telepathy [0306042v1] |
Implementation of projective measurements with linear optics and
continuous photon counting [0410133v2] |