Security of two quantum cryptography protocols using the same four qubit states BRANCIARD, Cyril, et al. The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study of SARG04 in ...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
Cryptography has begun its journey into the field of quantum information theory. Classical cryptogra...
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been w...
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been w...
We propose a security proof for a new class of quantum key distribution protocol namely Improved-SAR...
We prove the unconditional security of ``Quantum cryptography protocols robust against photon number...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
We propose a novel quantum cryptographic protocol without using polarized photons. The protocol cons...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
Cryptography has begun its journey into the field of quantum information theory. Classical cryptogra...
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been w...
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been w...
We propose a security proof for a new class of quantum key distribution protocol namely Improved-SAR...
We prove the unconditional security of ``Quantum cryptography protocols robust against photon number...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
We propose a novel quantum cryptographic protocol without using polarized photons. The protocol cons...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
Cryptography has begun its journey into the field of quantum information theory. Classical cryptogra...