- BB84.C. Bennet and G. Brassard, "Quantunl cryptography: Public key distribution and coin tossing," Proceedings oj H?EE Interna-tional Conference on Computers, Systems, and Szgn al Processing, Bangalore, India, December 1984, 175-179.Google Scholar
- BB89.C. Bennetand G. Brassard, ''The dawnofa new era for quantllm cryptography: the ex-perimental prototype is working," SIGA CT News, 20 (1989), 78-82. Google ScholarDigital Library
- BBBSS92.C. Bennet, F. Bessette, G. Brassard, L. Salvail and *J. Smoliu, "Experinlent al quan-tum cryptography," Journal of Cryptology, 5 (1992), 3-28. Google ScholarDigital Library
- BBBW83.C. J3ennet, G. Brassard, S. Breidbard, and S. Wiesner, "Quantum cryptography, or unforgeable subway tokens," in A duan ces m Cryptology: Proceedings of CR YP TO '82, Plenum Press, 1983, 267-275.Google Scholar
- BBCS92.C. Bennet, G. Brassard, C, Cr6peau, and M.-H. Skubisze.wska, "Practical quan-tum oblivious transfer," of CRYP TO '91, Lecture puter Science, Volume 576, Berlin, 1992, 351-366. in Proceedings Notes in Com-Springer- Verlag, Google ScholarDigital Library
- BC91.G. Brassard and C. Cr6peau, "Quantum bit commitment and coin tossing proto-cols," in Advances in Cryptology: Proceed-ings of CR YP 7'0 'W, Lecture Notes in Conl-put er Science, l'olume 537, Springer-Verlag, Berlin, 1991, 49-61. Google ScholarDigital Library
- BCJL93.G. Brassard, C. Cr6peau, R. Jozsa, and D. Langlois, "A quantum bit commitment scheme provably unbreakable b-y both par-ties," Proceedings of 1993 IEEE Annual Sympos%um on JWundations oj Computer Science, November 1993, 362-369.Google Scholar
- Cr90.C. Cr6peau, "Correct and private reduc-tions among oblivious transfers,'" Ph.D. the-sis, Depart ment of EE(!S, MIT, 1990.Google Scholar
- Cr94.C. Cr6peau, "Quantum oblivious transfer,"' in Journal of Modem Optics, special issue on quantum cryptography, to appear.Google Scholar
- Ki88.J. Kilian, "Founding cryptography on obliv-ious transfer," Proceedings of 1988 ACM Annual Symposium on Theory of Computi-ng, hlay 1988, 20-31. Google ScholarDigital Library
- Ma94b.D. Mayers. "Quantunl transformation and generalized measurements," preprint, dis-tribut ed at Workshop on Qua,n tum Comput-ing and Communication, hTational Institute of Standards and Technology, Gaithersburg. Maryland, August 18-19, 1994.Google Scholar
- MS94.D. Ma,vers and L. Salvail, "Quantum obliv-ious transfer is secure against individ-ual measurements," preprint, distributed at Workshop on Quantum Computing and Communication, National Institute of Stan-dards and Technology-, Cait hersburg, Mary-land, August 18-19, 1994.Google Scholar
- Ra81.M. Rabin, "IIow to exchange secrets by oblivious transfer, " technical report TR-81, Aiken Computation Laboratory, Har-vard University. 1981.Google Scholar
- TRT93.P. Townsend, J. Rarity, and P. Tapster, "Single photon interference in a 10km long op l,ical fibre irlterferolrle~ er," Elec lronac let-ters, 29 (1993), 634-635.Google ScholarCross Ref
- TRT94.P. Townsend, J. Rarity, and P. Tapster. "Enhanced single photon visibility in a 10km long prototype quant urn cryptogra-phy channel," Electronic lett~rs, to appear.Google Scholar
- Wi70.S. Wiesner, "Conjugate coding," SIGA CT News 15 (1983), 78-88; manuscript cn-ca 1970, Google ScholarDigital Library
Index Terms
- Security of quantum protocols against coherent measurements
Recommendations
Security analysis of the time-coding quantum key distribution protocols
We report on the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect ...
Collusive attacks to "circle-type" multi-party quantum key agreement protocols
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate ...
Secure Quantum Extraction Protocols
Theory of CryptographyAbstractKnowledge extraction, typically studied in the classical setting, is at the heart of several cryptographic protocols. The prospect of quantum computers forces us to revisit the concept of knowledge extraction in the presence of quantum ...
Comments