Browse > Article

양자 상태 수 변화에 따른 양자 암호키 분배 보안성 분석  

Go, Hae-Sin (한국과학기술원)
Im, Gyeong-Cheon (한국과학기술원)
Kim, Gi-Ung (한국과학기술원)
Seo, Chang-Ho (한국과학기술원)
Lee, Jun-Gu (한국과학기술원)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Peev, C. Pacher, R. All'eaume, C. Barreiro, J. Bouda, W. Boxleitner,T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes et al., "The secoqc quantum key distribution network in vienna," New Journal of Physics, vol. 11, no. 7, p. 075001, 2009.   DOI
2 M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka et al., "Field test of quantum key distribution in the tokyo qkd network," Optics Express, vol. 19, no. 11, pp. 10 387-10 409, 2011.   DOI
3 C. H. Bennett, G. Brassard et al., "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, no. 0. New York, 1984.
4 D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Physical Review Letters, vol. 77, no. 13, p. 2818, 1996.   DOI
5 H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography," Physical Review A, vol. 59, no. 6, p. 4238, 1999.   DOI
6 J.-D. Wang, Z.-J. Wei, H. Zhang, X.-J. Qin, X.-B. Liu, Z.-M. Zhang, C.-J. Liao, and S.-H. Liu, "Efficient quantum key distribution via singlephoton two-qubit states," Journal of Physics B: Atomic, Molecular and Optical Physics, vol. 43, no. 9, p. 095504, 2010.   DOI
7 W. K. Wootters and W. H. Zurek, "A single quantum cannot be cloned,"Nature, vol. 299, no. 5886, pp. 802-803, 1982.   DOI
8 C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, "Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy," Physical Review A, vol. 56, no. 2, p. 1163, 1997.   DOI
9 J. Cirac and N. Gisin, "Coherent eavesdropping strategies for the four state quantum cryptography protocol," Physics Letters A, vol. 229, no. 1, pp. 1-7, 1997.   DOI
10 N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of modern physics, vol. 74, no. 1, p. 145, 2002.   DOI   ScienceOn
11 E. Knill, R. Laflamme, and G. J. Milburn, "A scheme for efficient quantum computation with linear optics," Nature, vol. 409, no. 6816, pp. 46-52, 2001.   DOI   ScienceOn
12 A. Peres, Quantum theory: concepts and methods. Springer, 1995, vol. 57.