Unconditional security in quantum cryptography
Top Cited Papers
- 1 May 2001
- journal article
- Published by Association for Computing Machinery (ACM) in Journal of the ACM
- Vol. 48 (3) , 351-406
- https://doi.org/10.1145/382780.382781
Abstract
No abstract availableKeywords
All Related Versions
This publication has 15 references indexed in Scilit:
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Unconditionally Secure Quantum Bit Commitment is ImpossiblePhysical Review Letters, 1997
- Security of Quantum Cryptography against Collective AttacksPhysical Review Letters, 1997
- 25 years of quantum cryptographyACM SIGACT News, 1996
- Purification of Noisy Entanglement and Faithful Teleportation via Noisy ChannelsPhysical Review Letters, 1996
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of ObservationsThe Annals of Mathematical Statistics, 1952