2006
DOI: 10.1016/s0079-6638(06)49005-3
|View full text |Cite
|
Sign up to set email alerts
|

Quantum cryptography

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
139
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 130 publications
(140 citation statements)
references
References 166 publications
(178 reference statements)
1
139
0
Order By: Relevance
“…where n 01,ν /(n 01,ν +n 10,ν ) = sin 2 θ (ν) 1 and m 01,ν /(m 01,ν + m 10,ν ) = sin 2 φ (ν) 1 . In addition, n Ω,ν can be expressed as…”
Section: Appendix B: Detailed Calculations For the Phase Error Estimamentioning
confidence: 99%
See 1 more Smart Citation
“…where n 01,ν /(n 01,ν +n 10,ν ) = sin 2 θ (ν) 1 and m 01,ν /(m 01,ν + m 10,ν ) = sin 2 φ (ν) 1 . In addition, n Ω,ν can be expressed as…”
Section: Appendix B: Detailed Calculations For the Phase Error Estimamentioning
confidence: 99%
“…So far, several QKD protocols have been proposed and experimentally demonstrated [1]. In real life QKD, loss and noises in the quantum channel limit the achievable distance.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the DPS QKD protocol can be implemented in long-distance quantum communications, between the quantum repeater nodes. As follows, we will focus on this QKD scheme, however there are many other QKD schemes available, see (Branciard et al, 2005), (Dušek et al, 2006), (Hübel et al, 2007), (Gomez-Sousa & Curty, 2009), (Kwiat et al, 2001), (Niederberger et al, 2005), (Renner et al, 2005).…”
Section: Qkd For Optical Fibersmentioning
confidence: 99%
“…The DPS QKD protocol has deep relevance to practical applications, since the differential phase shift QKD protocol is much simpler in hardware design than the well known QKD protocols, such as BB84 or the Six-state QKD protocols. Results on the security of DPS QKD protocol was published by Assche (Van Assche et al, 2004), Branciard, Gisin, and Scarani (Branciard et al, 2008), and several other attacks against various QKD schemes have been studied by Acín04 (Acín et al, 2004) (Dušek et al, 2006), Fasel (Fasel et al, 2004), Branciard (Branciard et al, 2005), and Gomez-Sousa and Curty (Gomez-Sousa & Curty, 2009), Hübel (Hübel et al, 2007), Niederberger (Niederberger et al, 2005), Renner05 (Renner et al, 2005).…”
Section: Demonstration Of Qkdmentioning
confidence: 99%
“…Quantum key distribution (QKD) protocols typically involve a two-step procedure in order to generate a secret key [1,2]. First, the legitimate users (Alice and Bob) perform a set of measurements on effective bipartite quantum states that are distributed to them.…”
Section: Introductionmentioning
confidence: 99%