• Chinese Journal of Quantum Electronics
  • Vol. 21, Issue 6, 725 (2004)
[in Chinese]1,2,*, [in Chinese]1, and [in Chinese]1
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: Cite this Article
    [in Chinese], [in Chinese], [in Chinese]. Information investigation for B92 protocol in the case of opaque eavesdropping[J]. Chinese Journal of Quantum Electronics, 2004, 21(6): 725 Copy Citation Text show less
    References

    [1] Bennett C H, et al. Proceedings of IEEE International Conf. Computer, Systems, and Signal Processing [C]∥Bangalore, India (New York): 1984, 175.

    [2] Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett.,1991, 67: 661-663.

    [3] Bennett C H. Quantum cryptography using two non-orthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.

    [4] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrary long distances [J]. Science,1999, 283: 2050-2056.

    [5] Mayers D. On the security of the quantum oblivious transfer and key distribution protocol [J]. Proc. Crypto,1996, 343.

    [6] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys. Rev.Lett., 2000, 85: 441.

    [7] Hughes R J, Morgan G L, Peterson C G. Quantum key distribution over 48 km optical fibre network [J]. J. Mod.Opt., 2000, 47: 533.

    [10] Ekert A K, Huttner B, et al. Eavesdropping on quantum cryptographical systems [J]. Phys. Rev. A, 1994, 50:1047-1055.

    [in Chinese], [in Chinese], [in Chinese]. Information investigation for B92 protocol in the case of opaque eavesdropping[J]. Chinese Journal of Quantum Electronics, 2004, 21(6): 725
    Download Citation