Chinese Journal of Quantum Electronics, Volume. 22, Issue 5, 704(2005)

Analysis of basis direction deviation in quantum communication

[in Chinese]*... [in Chinese], [in Chinese] and [in Chinese] |Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less
    References(14)

    [1] [1] Gisin N, R bordy G, Rittel W, et al. Quantum cryptography [J]. Reviews of Modern Physics, 2002, 74: 145-195.

    [2] [2] Townsend P D, Thompson I. A quantum key distribution channel based on optical fibre [J]. J. of Modern Opt.,1994, 41(12): 2425-2433.

    [3] [3] Chiangga S, Zarda P. Towards practical quantum cryptography [J]. Appl. Phys., 1999, B69: 389-393.

    [4] [4] Tapster P R, Rarity J G. Violation of Bell's inequality over 4 km of optical fiber [J]. Phys. Rev. Lett., 1994,73(14): 1923-1926.

    [5] [5] Eberly J H. Bell inqualitities and quantum mechanics [J]. Am. J. Phys., 2002, 70(3): 276-279.

    [6] [6] Bennet C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing [C] ∥ Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984, 175-179.

    [7] [7] Ekert A. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett., 1991, 67(6): 661-663.

    [8] [8] Blow K J, Phoenix S J D. On a fundamental theorem of quantum cryptography [J]. J. Mod. Opt., 1993, 40(1):33-36.

    [9] [9] Barnett S M. Eavesdropping strategies and rejected-data protocols in quantum cryptography [J]. J. Mod. Opt.,1993, 40(12): 2501-2513.

    [10] [10] Bruss D. Optimal eavesdropping in quantum cryptography with six states [J]. Phys. Rev. Lett., 1998, 81(14):3018-3021.

    [11] [11] Hwang W Y. Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks [J]. Phys. Lett. A, 2001, 279: 133-138.

    [12] [12] Naik D S, Peterson S G. Entangled state quantum cryptography: eavesdropping on the ekert protocol [J]. Phys.Rev. Lett., 2000, 84(20): 4733-4736.

    [13] [13] Scarani V, Gisin N. Quantum key distribution between N partners: optimal eavesdropping and Bell's inequalities [J]. Phys. Rev. A, 2001, 65: 012311.

    [14] [14] Waks E, Zeevi A. Security of quantum key distribution with entangled photons against individual attacks [J].Phys. Rev. A., 2002, 65: 052310.

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Analysis of basis direction deviation in quantum communication[J]. Chinese Journal of Quantum Electronics, 2005, 22(5): 704

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jun. 30, 2004

    Accepted: --

    Published Online: May. 15, 2006

    The Author Email: (lqwr_cn@126.com)

    DOI:

    Topics