Linking Classical and Quantum Key Agreement: Is There “Bound Information”?
- 11 August 2000
- book chapter
- Published by Springer Nature
- p. 482-500
- https://doi.org/10.1007/3-540-44598-6_30
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategyPhysical Review A, 1997
- Quantum cloning, eavesdropping and Bell's inequalityPhysics Letters A, 1997
- Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy ChannelsPhysical Review Letters, 1996
- Quantum copying: Beyond the no-cloning theoremPhysical Review A, 1996
- Purification of Noisy Entanglement and Faithful Teleportation via Noisy ChannelsPhysical Review Letters, 1996
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969