首页 > 最新文献

Quantum Cryptography and Computing最新文献

英文 中文
Nonmultiplicativity of probability of faithful teleportation in the Knill-Laflamme-Milburn scheme Knill-Laflamme-Milburn格式中忠实隐形传态概率的非乘法性
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-195
A. Grudka, J. Modlawska
{"title":"Nonmultiplicativity of probability of faithful teleportation in the Knill-Laflamme-Milburn scheme","authors":"A. Grudka, J. Modlawska","doi":"10.3233/978-1-60750-547-1-195","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-195","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simplifying information-theoretic arguments by post-selection 通过后选择简化信息理论论证
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-66
R. Renner
Devices and protocols for information processing are often required to work for arbitrary inputs. For example, in channel coding theory, one demands that a coding scheme transmits any possible input state reliably over a given noisy channel. Similarly, in quantum cryptography, security of a protocol should hold independently of the inputs, even if they are chosen maliciously. In this short paper, we review the Post-Selection Technique introduced in (Phys. Rev. Lett. 102:020504, 2009). Its main purpose is to simplify the analysis of information processing schemes so that only one single input needs to be considered. If a scheme satisfies a desired criterion when acting on this particular input, then—under certain symmetry conditions—the same criterion is automatically met for arbitrary inputs. We illustrate the Post-Selection Technique at the example of quantum cryptography. Here, it can be used to show that security of a Quantum Key Distribution scheme against general attacks—somewhat surprisingly—follows from its security against one specific attack. This not only simplifies security proofs, but also has other remarkable implications, e.g., that no randomness is needed for privacy amplification.
用于信息处理的设备和协议通常需要为任意输入工作。例如,在信道编码理论中,人们要求编码方案在给定的噪声信道上可靠地传输任何可能的输入状态。类似地,在量子密码学中,协议的安全性应该独立于输入,即使它们是恶意选择的。在这篇短文中,我们回顾了《物理学》中介绍的后选择技术。启示,102:020504,2009)。其主要目的是简化信息处理方案的分析,以便只需要考虑一个输入。如果一个方案在作用于这个特定输入时满足所需的准则,那么在某些对称条件下,对于任意输入也会自动满足相同的准则。我们以量子密码学为例说明后选择技术。在这里,它可以用来表明量子密钥分发方案对一般攻击的安全性(有点令人惊讶)遵循其对特定攻击的安全性。这不仅简化了安全证明,而且还有其他显着的含义,例如,隐私放大不需要随机性。
{"title":"Simplifying information-theoretic arguments by post-selection","authors":"R. Renner","doi":"10.3233/978-1-60750-547-1-66","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-66","url":null,"abstract":"Devices and protocols for information processing are often required to work for arbitrary inputs. For example, in channel coding theory, one demands that a coding scheme transmits any possible input state reliably over a given noisy channel. Similarly, in quantum cryptography, security of a protocol should hold independently of the inputs, even if they are chosen maliciously. In this short paper, we review the Post-Selection Technique introduced in (Phys. Rev. Lett. 102:020504, 2009). Its main purpose is to simplify the analysis of information processing schemes so that only one single input needs to be considered. If a scheme satisfies a desired criterion when acting on this particular input, then—under certain symmetry conditions—the same criterion is automatically met for arbitrary inputs. We illustrate the Post-Selection Technique at the example of quantum cryptography. Here, it can be used to show that security of a Quantum Key Distribution scheme against general attacks—somewhat surprisingly—follows from its security against one specific attack. This not only simplifies security proofs, but also has other remarkable implications, e.g., that no randomness is needed for privacy amplification.","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Commercial potential of quantum cryptography 量子密码术的商业潜力
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-18
J. Dubois
{"title":"Commercial potential of quantum cryptography","authors":"J. Dubois","doi":"10.3233/978-1-60750-547-1-18","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-18","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On practical implementations of qudit-based quantum key distribution protocols 基于量子比特的量子密钥分发协议的实际实现
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-83
S. Straupe, S. Kulik
{"title":"On practical implementations of qudit-based quantum key distribution protocols","authors":"S. Straupe, S. Kulik","doi":"10.3233/978-1-60750-547-1-83","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-83","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimode detection of broadband squeezed vacuum 宽带压缩真空的多模检测
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-161
I. Agafonov, M. Chekhova, T. Iskhakov, G. Leuchs
{"title":"Multimode detection of broadband squeezed vacuum","authors":"I. Agafonov, M. Chekhova, T. Iskhakov, G. Leuchs","doi":"10.3233/978-1-60750-547-1-161","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-161","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125189560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal local protocols for processing of entangled states - local cloning and eavesdropping 处理纠缠态的最优局部协议——局部克隆和窃听
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-3
R. Demkowicz-Dobrzański
{"title":"Optimal local protocols for processing of entangled states - local cloning and eavesdropping","authors":"R. Demkowicz-Dobrzański","doi":"10.3233/978-1-60750-547-1-3","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-3","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local bounds for general Bell inequalities with the reduced entropy of the settings 一般贝尔不等式的局部边界与设置的降熵
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-224
M. Pawłowski, K. Horodecki, P. Horodecki, R. Horodecki
{"title":"Local bounds for general Bell inequalities with the reduced entropy of the settings","authors":"M. Pawłowski, K. Horodecki, P. Horodecki, R. Horodecki","doi":"10.3233/978-1-60750-547-1-224","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-224","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131179610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phase-time coding quantum cryptography 相时编码量子密码学
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-41
S. N. Molotkov
{"title":"Phase-time coding quantum cryptography","authors":"S. N. Molotkov","doi":"10.3233/978-1-60750-547-1-41","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-41","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127210679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tools for optical implementations of quantum communication protocols with application to quantum key distribution 量子通信协议的光学实现工具及其在量子密钥分配中的应用
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-31
N. Lütkenhaus
{"title":"Tools for optical implementations of quantum communication protocols with application to quantum key distribution","authors":"N. Lütkenhaus","doi":"10.3233/978-1-60750-547-1-31","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-31","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130321194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Observable measures of entanglement 可观察到的纠缠量
Pub Date : 1900-01-01 DOI: 10.3233/978-1-60750-547-1-239
C. V. Usenko
{"title":"Observable measures of entanglement","authors":"C. V. Usenko","doi":"10.3233/978-1-60750-547-1-239","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-239","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129606274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Quantum Cryptography and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1