The security of practical quantum key distribution
Citations
2,781 citations
Cites background from "The security of practical quantum k..."
...For an elementary introduction to Gaussian quantum channels, see Eisert and Wolf (2007), and for continuous-variable quantum cryptography, see the reviews of Cerf and Grangier (2007) and Scarani et al. (2009)....
[...]
2,077 citations
1,639 citations
1,397 citations
Cites background or methods from "The security of practical quantum k..."
...These pairwise keys allow the end nodes to generate their own key, provided that all intermediary nodes are trusted (14)....
[...]
...The hardware required at the lowest stage (mainly light sources, optical links, and detectors) has been described in detail in previous literature (14, 23)....
[...]
1,387 citations
References
14,980 citations
"The security of practical quantum k..." refers methods in this paper
...In particular, most often some realization of the DiffieHellman algorithm (Diffie and Hellman, 1976) is used in the key agreement phase....
[...]
9,259 citations
"The security of practical quantum k..." refers background or methods in this paper
...…solution to the key distribution problem based on quantum physics (Bennett and Brassard, 1984); this idea, independently re-discovered by Ekert a few years later (Ekert, 1991), was the beginning of quantum key distribution (QKD) which was to become the most promising task of quantum cryptography1 ....
[...]
...It was not until 1991, when Artur Ekert, independently from the earlier developments, published a paper on quantum key distributions, that the field gained a rapid popularity (Ekert, 1991)....
[...]
...In other words, the outcomes of the measurements did not exist before the measurements; but then, in particular, Eve could not know them (Ekert, 1991)....
[...]
...The idea is basically the one that triggered Ekert’s discovery (Ekert, 1991), although Ekert himself did not push it that far: the fact, that Alice and Bob observe correlations that violate a Bell inequality, is enough to guarantee entanglement, independent of the nature of the quantum signals and…...
[...]
...The corresponding EB protocol is known as BBM (Bennett, Brassard and Mermin, 1992); the E91 protocol (Ekert, 1991) is equivalent to it when implemented with qubits....
[...]
8,777 citations
"The security of practical quantum k..." refers background in this paper
...Three decades later, Shannon proved that the Vernam scheme is optimal: there is no encryption method that requires less key (Shannon, 1949)....
[...]
7,658 citations
7,427 citations