Chinese Journal of Quantum Electronics, Volume. 21, Issue 6, 725(2004)
Information investigation for B92 protocol in the case of opaque eavesdropping
[1] [1] Bennett C H, et al. Proceedings of IEEE International Conf. Computer, Systems, and Signal Processing [C]∥Bangalore, India (New York): 1984, 175.
[2] [2] Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett.,1991, 67: 661-663.
[3] [3] Bennett C H. Quantum cryptography using two non-orthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.
[4] [4] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrary long distances [J]. Science,1999, 283: 2050-2056.
[5] [5] Mayers D. On the security of the quantum oblivious transfer and key distribution protocol [J]. Proc. Crypto,1996, 343.
[6] [6] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys. Rev.Lett., 2000, 85: 441.
[7] [7] Hughes R J, Morgan G L, Peterson C G. Quantum key distribution over 48 km optical fibre network [J]. J. Mod.Opt., 2000, 47: 533.
[10] [10] Ekert A K, Huttner B, et al. Eavesdropping on quantum cryptographical systems [J]. Phys. Rev. A, 1994, 50:1047-1055.
Get Citation
Copy Citation Text
[in Chinese], [in Chinese], [in Chinese]. Information investigation for B92 protocol in the case of opaque eavesdropping[J]. Chinese Journal of Quantum Electronics, 2004, 21(6): 725