Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Pereira, Z. Ou, H. Kimble (2000)
Quantum Communication with Correlated Nonclassical States.Physical Review A, 62
P. Loock, S. Braunstein (1999)
Continuous variable quantum cryptographyPhysical Review A, 61
R. Renner, J. Cirac (2008)
De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.Physical review letters, 102 11
M. Beck (2005)
Introductory Quantum OpticsAmerican Journal of Physics, 73
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
Y. Yeo (2006)
Local noise can enhance two-qubit teleportationPhysical Review A, 78
Charles Bennett, S. Wiesner (1992)
Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states.Physical review letters, 69 20
M. Kafatos (1989)
Bell's theorem, quantum theory and conceptions of the universe
Xiao-yu Zhang, G. Guo (1996)
Quantum Cryptography Using Coherent StateChinese Physics Letters, 13
Christian Monyk (2019)
Quantum CryptographyFoundations of Physics, 40
P. Huang (2009)
Two-step unsymmetrical quantum key distribution protocol using GHZ triplet states purchase the full-text articleJournal Chine. Universities Posts and telecommunication, 16
S. Hill, W. Wootters (1997)
Entanglement of a Pair of Quantum BitsPhysical Review Letters, 78
C. Silberhorn, N. Korolkova, G. Leuchs (2001)
Quantum key distribution with bright entangled beams.Physical review letters, 88 16
F. Grosshans, G. Assche, J. Wenger, R. Brouri, N. Cerf, P. Grangier (2003)
Quantum key distribution using gaussian-modulated coherent statesNature, 421
A. Allati, Nasser Metwally, Nasser Metwally, Y. Hassouni (2010)
Transfer information remotely via noise entangled coherent channelsOptics Communications, 284
Hwayean Lee, Jongin Lim, H. Yang (2005)
Quantum direct communication with authenticationPhysical Review A, 73
H. Jeong, A. Lund, T. Ralph (2004)
Production of superpositions of coherent states in traveling optical fields with inefficient photon detectionPhysical Review A, 72
F. Grosshans (2004)
Collective attacks and unconditional security in continuous variable quantum key distribution.Physical review letters, 94 2
R. Gilmore (1972)
GEOMETRY OF SYMMETRIZED STATES.Annals of Physics, 74
Nicolas Gisin, G. Ribordy, W. Tittel, Hugo Zbinden (2001)
Quantum cryptography
W. Wootters (1997)
Entanglement of Formation of an Arbitrary State of Two QubitsPhysical Review Letters, 80
Ting Gao, Fengli Yan, Zhixi Wang (2004)
Deterministic secure direct communication using GHZ states and swapping quantum entanglementarXiv: Quantum Physics
Jinhyoung Lee, Myungshik Kim (1999)
Entanglement teleportation via werner statesPhysical review letters, 84 18
Q. Zhong, Zhaohui Wang, Y. Sun, Qihe Zhu, F. Kong (1996)
Vibrational relaxation of dye molecules in solution studied by femtosecond time-resolved stimulated emission pumping fluorescence depletionChemical Physics Letters, 248
(1984)
In: Proceedings IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, (IEEE, New York), pp
N. Mermin (2002)
Deconstructing dense codingPhysical Review A, 66
Xiong Jin, Zhang Zhe-Shen, Zhou Nan-run, Peng Jinye, Zeng Guihua (2007)
Unsymmetrical Quantum Key Distribution Using Tripartite EntanglementCommunications in Theoretical Physics, 47
S. Iblisdir, G. Assche, N. Cerf (2003)
Security of quantum key distribution with coherent states and homodyne detection.Physical review letters, 93 17
F. Grosshans, P. Grangier (2001)
Continuous variable quantum cryptography using coherent states.Physical review letters, 88 5
H. Jeong, Myungshik Kim (2001)
Efficient quantum computation using coherent statesPhysical Review A, 65
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
Zhan-jun Zhang (2006)
Comment on : Quantum direct communication with authenticationPhysical Review A, 75
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
C. Silberhorn, T. Ralph, N. Lütkenhaus, G. Leuchs (2002)
Continuous variable quantum cryptography: beating the 3 dB loss limit.Physical review letters, 89 16
W. Wootters, W. Wootters, W. Zurek (1982)
A single quantum cannot be clonedNature, 299
Peng Huang, Ye Liu, Nanrun Zhou, Guihua Zeng (2009)
Two-step unsymmetrical quantum key distribution protocol using GHZ triplet statesThe Journal of China Universities of Posts and Telecommunications, 16
Rui Zhang, S. Garner, L. Hau (2009)
Creation of long-term coherent optical memory via controlled nonlinear interactions in Bose-Einstein condensates.Physical review letters, 103 23
Charles Bennett, G. Brassard, N. Mermin (1992)
Quantum cryptography without Bell's theorem.Physical review letters, 68 5
R. Glauber (2006)
Quantum Theory of Optical Coherence
Charles Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin (1991)
Experimental quantum cryptographyJournal of Cryptology, 5
Y. Hardy, W. Steeb (2001)
Quantum Information Theory
R. Glauber (1963)
Coherent and incoherent states of the radiation fieldPhysical Review, 131
R. García-Patrón, N. Cerf (2006)
Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.Physical review letters, 97 19
N. Metwally (2008)
Abrupt decay of entanglement and quantum communication through noise channelsQuantum Information Processing, 9
(1989)
In: Kafatos, M
We propose a quantum key distribution protocol using Greenberger Horne Zeilinger tripartite coherent states. The sender and the receiver share similar key by exchanging the correlation coherent states, without basis reconciliation. This allows the protocol to have a transmission efficiency of 100% in a perfect quantum channel. The security of the protocol is ensured by tripartite coherent states correlation and homodyne detection, which allows to detect any eavesdropping easily.
Quantum Information Processing – Springer Journals
Published: Dec 16, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.