Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Gilbert, M. Hamrick (2000)
Practical Quantum Cryptography: A Comprehensive Analysis (Part One)arXiv: Quantum Physics
D. Mayers (1996)
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
P. Kok, Hwang Lee, J. Dowling (2002)
Single-photon quantum-nondemolition detectors constructed with linear optics and projective measurementsPhysical Review A, 66
G. Ribordy, J. Brendel, J. Gautier, N. Gisin, H. Zbinden (2000)
Long-distance entanglement-based quantum key distributionPhysical Review A, 63
T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, Anton Vienna, U. Innsbruck, U. Munich (1999)
A fast and compact quantum random number generatorReview of Scientific Instruments, 71
Y. Mazurenko, R. Giust, J. Goedgebuer (1997)
Spectral coding for secure optical communications using refractive index dispersionOptics Communications, 133
L. Allen, L. Allen, M. Padgett, M. Babiker (1999)
IV The Orbital Angular Momentum of LightProgress in Optics, 39
Richard Hughes, G. Morgan, C. Peterson (1999)
Quantum key distribution over a 48 km optical fibre networkJournal of Modern Optics, 47
G. Hockney, P. Kok, J. Dowling (2002)
Suitability versus fidelity for rating single-photon gunsPhysical Review A, 67
W. Tittel, J. Brendel, H. Zbinden, N. Gisin (1999)
Quantum cryptography using entangled photons in energy-time bell statesPhysical review letters, 84 20
P. Townsend, J. Rarity, P. Tapster (1993)
Single photon interference in 10 km long optical fibre interferometerElectronics Letters, 29
Richard Hughes, G. Luther, G. Morgan, C. Peterson, C. Simmons (1996)
Quantum Cryptography over Underground Optical Fibers
S. Molotkov (1998)
Quantum cryptography using photon “frequency” states (example of a possible realization)Journal of Experimental and Theoretical Physics, 87
P. Sun, Yuri Mazurenko, Y. Fainman (1995)
Long-distance frequency-division interferometer for communication and quantum cryptography.Optics letters, 20 9
N. Lutkenhaus (1998)
Estimates for practical quantum cryptography
Christian Monyk (1995)
Quantum Cryptography
C. Hong, Z. Ou, L. Mandel (1987)
Measurement of subpicosecond time intervals between two photons by interference.Physical review letters, 59 18
(1985)
Quantum public key distribution system
G. Gilbert, M. Hamrick (2001)
Secrecy, Computational Loads and Rates in Practical Quantum CryptographyAlgorithmica, 34
Devang Naik, C. Peterson, A. White, A. White, A. Berglund, P. Kwiat (1999)
Entangled state quantum cryptography: eavesdropping on the ekert protocolPhysical review letters, 84 20
A. Muller, J. Breguet, N. Gisin (1993)
Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 kmEPL (Europhysics Letters), 23
L. Allen, M. Beijersbergen, R. Spreeuw, J. Woerdman (1992)
Orbital angular momentum of light and the transformation of Laguerre-Gaussian laser modes.Physical review. A, Atomic, molecular, and optical physics, 45 11
J. Franson (1989)
Bell inequality for position and time.Physical review letters, 62 19
B. Lounis, M. Orrit (2005)
Single-photon sourcesReports on Progress in Physics, 68
D. Mayers, A. Yao (1998)
Quantum cryptography with imperfect apparatusProceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
Charles Bennett, G. Brassard, C. Crépeau, U. Maurer (1994)
Generalized privacy amplificationProceedings of 1994 IEEE International Symposium on Information Theory
J. Breguet, A. Muller, N. Gisin (1994)
Quantum Cryptography with Polarized Photons in Optical Fibres: Experiment and Practical LimitsJournal of Modern Optics, 41
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
J. Breguet, N. Gisin (1995)
Interferometer using a 3 x 3 coupler and Faraday mirrors.Optics letters, 20 12
P. Townsend, J. Rarity, P. Tapster (1993)
Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channelElectronics Letters, 29
A. Muller, Hugo Zbinden, Nicolas Gisin (1995)
Underwater quantum codingNature, 378
Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al. “Suitability versus Fidelity for Rating Single Photon Guns” to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.
Quantum Information Processing – Springer Journals
Published: Jan 31, 2005
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.