양자 상태 수 변화에 따른 양자 암호키 분배 보안성 분석
![]() |
Go, Hae-Sin
(한국과학기술원)
Im, Gyeong-Cheon (한국과학기술원) Kim, Gi-Ung (한국과학기술원) Seo, Chang-Ho (한국과학기술원) Lee, Jun-Gu (한국과학기술원) |
1 | M. Peev, C. Pacher, R. All'eaume, C. Barreiro, J. Bouda, W. Boxleitner,T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes et al., "The secoqc quantum key distribution network in vienna," New Journal of Physics, vol. 11, no. 7, p. 075001, 2009. DOI |
2 | M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka et al., "Field test of quantum key distribution in the tokyo qkd network," Optics Express, vol. 19, no. 11, pp. 10 387-10 409, 2011. DOI |
3 | C. H. Bennett, G. Brassard et al., "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, no. 0. New York, 1984. |
4 | D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Physical Review Letters, vol. 77, no. 13, p. 2818, 1996. DOI |
5 | H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography," Physical Review A, vol. 59, no. 6, p. 4238, 1999. DOI |
6 | J.-D. Wang, Z.-J. Wei, H. Zhang, X.-J. Qin, X.-B. Liu, Z.-M. Zhang, C.-J. Liao, and S.-H. Liu, "Efficient quantum key distribution via singlephoton two-qubit states," Journal of Physics B: Atomic, Molecular and Optical Physics, vol. 43, no. 9, p. 095504, 2010. DOI |
7 | W. K. Wootters and W. H. Zurek, "A single quantum cannot be cloned,"Nature, vol. 299, no. 5886, pp. 802-803, 1982. DOI |
8 | C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, "Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy," Physical Review A, vol. 56, no. 2, p. 1163, 1997. DOI |
9 | J. Cirac and N. Gisin, "Coherent eavesdropping strategies for the four state quantum cryptography protocol," Physics Letters A, vol. 229, no. 1, pp. 1-7, 1997. DOI |
10 | N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of modern physics, vol. 74, no. 1, p. 145, 2002. DOI ScienceOn |
11 | E. Knill, R. Laflamme, and G. J. Milburn, "A scheme for efficient quantum computation with linear optics," Nature, vol. 409, no. 6816, pp. 46-52, 2001. DOI ScienceOn |
12 | A. Peres, Quantum theory: concepts and methods. Springer, 1995, vol. 57. |
![]() |