Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Enzer, Phillip Hadley, Richard Hughes, C. Peterson, P. Kwiat (2002)
Entangled-photon six-state quantum cryptographyNew Journal of Physics, 4
Devang Naik, C. Peterson, A. White, A. White, A. Berglund, P. Kwiat (1999)
Entangled state quantum cryptography: eavesdropping on the ekert protocolPhysical review letters, 84 20
H. Bechmann-Pasquinucci, N. Gisin (1998)
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 59
M. Matsui (1994)
Linear Cryptanalysis Method for DES Cipher
E. Biham, A. Shamir (1990)
Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 4
H. Lo, H. Chau (1996)
Is Quantum Bit Commitment Really Possible?ArXiv, quant-ph/9603004
B. Julsgaard, Jacob Sherson, E. Polzik, J. Fiurášek, J. Cirac (2005)
Quantum memory for lightEQEC '05. European Quantum Electronics Conference, 2005.
D. Herriott, H. Schulte (1965)
Folded Optical Delay LinesApplied Optics, 4
Christian Monyk (2019)
Quantum CryptographyFoundations of Physics, 40
H. Lo, H. Chau (1998)
Unconditional security of quantum key distribution over arbitrarily long distancesScience, 283 5410
Charles Bennett, G. Brassard, C. Crépeau, U. Maurer (1994)
Generalized privacy amplificationProceedings of 1994 IEEE International Symposium on Information Theory
D. Bruß (1998)
Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 81
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
W. Wootters, W. Wootters, W. Zurek (1982)
A single quantum cannot be clonedNature, 299
P. Shor, J. Preskill (2000)
Simple proof of security of the BB84 quantum key distribution protocolPhysical review letters, 85 2
W. Tittel, J. Brendel, H. Zbinden, N. Gisin (1999)
Quantum cryptography using entangled photons in energy-time bell statesPhysical review letters, 84 20
Simon Singh (2003)
Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyQueue, 1
A. Kent (1998)
Unconditionally Secure Bit CommitmentPhysical Review Letters, 83
T. Pittman, J. Franson (2002)
Cyclical Quantum Memory for Photonic QubitsPhysical Review A, 66
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, A. Sanpera (1996)
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.Physical review letters, 77 13
M. Lukin, A. Imamoğlu, A. Imamoğlu (2001)
Controlling photons using electromagnetically induced transparencyNature, 413
Quantum cryptography is a method of communicating securely, the secrecy of which is guaranteed by the laws of physics and information theory. Current implementations suffer from relatively short ranges and low data rates. We are developing a system that modifies the usual protocol by incorporating elements of special relativity. The result is that in principle, every detected photon can be used in the final key, thus doubling or tripling the possible data rate. Our delayed-choice quantum cryptography (DCQC) system works by storing the photon sent to Bob in a low-loss optical delay line until a classical signal from Alice informs him which measurement basis to use.
Proceedings of SPIE – SPIE
Published: Feb 3, 2004
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.