Results 1 to 10 of about 502,023 (134)
Quantum cryptography: key distribution and beyond [PDF]
Quanta 6 (2017) 1-47, 2018 Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.H., Akshata Shenoy, Pathak, Anirban, Srikanth, R. +2 morearxiv +5 more sourcesQuantum Cryptography [PDF]
Reviews of Modern Physics, 2001 Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological ...Aspect, A., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bell, J. S., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Berry, M. V., Bethune, D., Biham, E., Biham, E., Bourennane, M., Bourennane, M., Bourennane, M., Brassard, G., Brendel, J., Brendel, J., Briegel, H.-J., Brouri, R., Brown, R. G. W., Brown, R. G. W., Brown, R. G. W., Brunel, C., Bruss, D., Bruss, D., Bréguet, J., Bréguet, J., Buttler, W. T., Buttler, W. T., Bužek, V., Canning, J., Cirac, J. I., Clarke, R. B. M., Clauser, J. F., Clauser, J. F., Cova, S., Cova, S., Csiszár, I., De Martini, F., Desurvire, E., Deutsch, D., Deutsch, D., Deutsch, D., Dieks, D., Diffie, W., Dur, W., Dur, W., Dusek, M., Einstein, A., Ekert, A. K., Ekert, A. K., Ekert, A. K., Ekert, A. K., Elamari, A., Felix, S., Fleury, L., Franson, J. D., Franson, J. D., Franson, J. D., Freedmann, S. J., Fry, E. S., Fuchs, C. A., Fuchs, C. A., Gisin, B., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Goldenberg, L., Gorman, P. M., Grégoire Ribordy, Gérard, J.-M., Gérard, J.-M., Haecker, W., Hall, M. J. W., Hariharan, P., Hillery, M., Hiskett, P. A., Hong, C. K., Hong, C. K., Horodecki, M., Hughes, R., Hughes, R., Hugo Zbinden, Huttner, B., Huttner, B., Huttner, B., Imamoglu, A., Ingerson, T. E., Ivanovic, I. D., Jacobs, B., Jennewein, T., Jennewein, T., Karlsson, A., Kempe, J., Kim, J., Kimble, H. J., Kitson, S. C., Kurtsiefer, C., Kurtsiefer, C., Kwiat, P. G., Kwiat, P. G., Lacaita, A., Lacaita, A., Larchuk, T. S., Levine, B. F., Li, M. J., Lo, H.-K., Lo, H.-K., Lütkenhaus, N., Lütkenhaus, N., Marand, C., Martinelli, M., Martinelli, M., Maurer, U. M., Maurer, U. M., Mayers, D., Mazurenko, Y., Michler, P., Milonni, P. W., Molotkov, S. N., Muller, A., Muller, A., Muller, A., Muller, A., Mérolla, J-M., Naik, D., Nicolas Gisin, Niu, C. S., Nogues, G., Owens, P. C. M., Peres, A., Peres, A., Phoenix, S. J. D., Rarity, J. G., Rarity, J. G., Ribordy, G., Ribordy, G., Ribordy, G., Rivest, R. L., Santori, C., Shannon, C. E., Shih, Y. H., Shor, P. W., Simon, C., Simon, C., Spinelli, A., Stefanov, A., Steinberg, A. M., Steinberg, A. M., Stucki, D., Sun, P. C., Tanzilli, S., Tapster, P. R., Thomas, G. A., Tittel, W., Tittel, W., Tittel, W., Tittel, W., Tomita, A., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P. D., Vernam, G., Vinegoni, C., Vinegoni, C., Weihs, G., Wiesner, S., Wolfgang Tittel, Wootters, W. K., Yuen, H. P., Zappa, F., Zbinden, H., Zeilinger, A., Żukowski, M., Żukowski, M. +187 morecore +9 more sourcesQuantum Cryptography [PDF]
Contemporary Physics, 1995 Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature.Bell J. S., Brassard G., Busch P., Clauser J. F., Conan Doyle A., D. M. Alde, Deutsch D., G. G. Luther, G. L. Morgan, Hayes B., Hodges A., Hughes R. I. G., Kahn D., Knuth D. E., Lamphere R. J., M. Schauer, P. Dyer, Richard J. Hughes, Schneier B., Schroeder M. R., Shannon C. E., Shor P. W., Simmons G. J., Vernam G. S., von Neumann J., von Neumann J., Walker N. G., Welsh D., Williams R. C., Wright P., Wrixon F. B. +30 morecore +2 more sourcesCounterfactual Quantum Cryptography [PDF]
Physical Review Letters, 2008 Quantum cryptography allows one to distribute a secret key between two remote
parties using the fundamental principles of quantum mechanics. The well-known
established paradigm for the quantum key distribution relies on the actual
transmission of signal ...C. H. Bennett, D. Gottesman, D. Mayers, R. Jozsa, R. Penrose, Tae-Gon Noh +5 morecore +4 more sourcesTomographic Quantum Cryptography [PDF]
Physical Review A, 2003 We present a protocol for quantum cryptography in which the data obtained for
mismatched bases are used in full for the purpose of quantum state tomography.A. Beige, A. Chefles, A.K. Ekert, A.S. Holevo, B.-G. Englert, C. Kurtsiefer, D. BruBruß, D. Deutsch, D. Kaszlikowski, D.S. Naik, E. Waks, H. Weyl, I. Csiszár, I.D. Ivanović, J. Schwinger, J.I. Cirac, L. Vaidman, M. Horodecki, N. Gisin, N. Gisin, N.J. Cerf, O. Schulz, P.K. Aravind, S.M. Barnett, T. Jennewein, U.M. Maurer, W. Tittel, W.K. Wootters, Y. Aharonov +28 morecore +4 more sourcesQuantum Cryptography in Practice [PDF]
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03, 2003 BBN, Harvard, and Boston University are building the DARPA Quantum Network,
the world's first network that delivers end-to-end network security via
high-speed Quantum Key Distribution, and testing that Network against
sophisticated eavesdropping attacks. Elliott, Chip, Pearson, David, Troxel, Gregory +2 morecore +4 more sourcesSingle photon quantum cryptography [PDF]
Physical Review Letters, 2002 We report the full implementation of a quantum cryptography protocol using a
stream of single photon pulses generated by a stable and efficient source
operating at room temperature.A. Beveratos, Alexios Beveratos, André Villing, C. H. Bennett, C. H. Bennett, F. Treussart, Jean-Philippe Poizat, Philippe Grangier, R. Brouri, Rosa Brouri, Thierry Gacoin +10 morecore +6 more sourcesQuantum Cryptography without Switching [PDF]
Physical Review Letters, 2004 We propose a new coherent state quantum key distribution protocol that
eliminates the need to randomly switch between measurement bases. This protocol
provides significantly higher secret key rates with increased bandwidths than
previous schemes that ...A. K. Ekert, Andrew M. Lance, C. E. Shannon, C. H. Bennett, Christian Weedbrook, G. Brassard, Ping Koy Lam, S. Wiesner, T. C. Ralph, Thomas Symul, Timothy C. Ralph, Warwick P. Bowen +11 morecore +7 more sourcesAdvances in quantum cryptography [PDF]
Advances in Optics and Photonics, 2020 Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes.S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, P. Wallden +17 moreopenaire +13 more sources