• Chinese Journal of Quantum Electronics
  • Vol. 22, Issue 5, 704 (2005)
[in Chinese]*, [in Chinese], [in Chinese], and [in Chinese]
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Analysis of basis direction deviation in quantum communication[J]. Chinese Journal of Quantum Electronics, 2005, 22(5): 704 Copy Citation Text show less
    References

    [1] Gisin N, R bordy G, Rittel W, et al. Quantum cryptography [J]. Reviews of Modern Physics, 2002, 74: 145-195.

    [2] Townsend P D, Thompson I. A quantum key distribution channel based on optical fibre [J]. J. of Modern Opt.,1994, 41(12): 2425-2433.

    [3] Chiangga S, Zarda P. Towards practical quantum cryptography [J]. Appl. Phys., 1999, B69: 389-393.

    [4] Tapster P R, Rarity J G. Violation of Bell's inequality over 4 km of optical fiber [J]. Phys. Rev. Lett., 1994,73(14): 1923-1926.

    [5] Eberly J H. Bell inqualitities and quantum mechanics [J]. Am. J. Phys., 2002, 70(3): 276-279.

    [6] Bennet C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing [C] ∥ Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984, 175-179.

    [7] Ekert A. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett., 1991, 67(6): 661-663.

    [8] Blow K J, Phoenix S J D. On a fundamental theorem of quantum cryptography [J]. J. Mod. Opt., 1993, 40(1):33-36.

    [9] Barnett S M. Eavesdropping strategies and rejected-data protocols in quantum cryptography [J]. J. Mod. Opt.,1993, 40(12): 2501-2513.

    [10] Bruss D. Optimal eavesdropping in quantum cryptography with six states [J]. Phys. Rev. Lett., 1998, 81(14):3018-3021.

    [11] Hwang W Y. Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks [J]. Phys. Lett. A, 2001, 279: 133-138.

    [12] Naik D S, Peterson S G. Entangled state quantum cryptography: eavesdropping on the ekert protocol [J]. Phys.Rev. Lett., 2000, 84(20): 4733-4736.

    [13] Scarani V, Gisin N. Quantum key distribution between N partners: optimal eavesdropping and Bell's inequalities [J]. Phys. Rev. A, 2001, 65: 012311.

    [14] Waks E, Zeevi A. Security of quantum key distribution with entangled photons against individual attacks [J].Phys. Rev. A., 2002, 65: 052310.

    [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Analysis of basis direction deviation in quantum communication[J]. Chinese Journal of Quantum Electronics, 2005, 22(5): 704
    Download Citation