Chinese Journal of Quantum Electronics, Volume. 21, Issue 6, 725(2004)

Information investigation for B92 protocol in the case of opaque eavesdropping

[in Chinese]1...2,*, [in Chinese]1 and [in Chinese]1 |Show fewer author(s)
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(8)

    [1] [1] Bennett C H, et al. Proceedings of IEEE International Conf. Computer, Systems, and Signal Processing [C]∥Bangalore, India (New York): 1984, 175.

    [2] [2] Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett.,1991, 67: 661-663.

    [3] [3] Bennett C H. Quantum cryptography using two non-orthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.

    [4] [4] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrary long distances [J]. Science,1999, 283: 2050-2056.

    [5] [5] Mayers D. On the security of the quantum oblivious transfer and key distribution protocol [J]. Proc. Crypto,1996, 343.

    [6] [6] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys. Rev.Lett., 2000, 85: 441.

    [7] [7] Hughes R J, Morgan G L, Peterson C G. Quantum key distribution over 48 km optical fibre network [J]. J. Mod.Opt., 2000, 47: 533.

    [10] [10] Ekert A K, Huttner B, et al. Eavesdropping on quantum cryptographical systems [J]. Phys. Rev. A, 1994, 50:1047-1055.

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese]. Information investigation for B92 protocol in the case of opaque eavesdropping[J]. Chinese Journal of Quantum Electronics, 2004, 21(6): 725

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Mar. 29, 2004

    Accepted: --

    Published Online: May. 15, 2006

    The Author Email: (zming394@yahoo.com.cn)

    DOI:

    Topics