Quantum cryptography: How to beat the code breakers using quantum mechanics

作者: Simon J. D. Phoenix , Paul D. Townsend

DOI: 10.1080/00107519508222150

关键词: Quantum cryptographyQuantum informationPhysicsQuantum technologyOpen quantum systemQuantum networkQuantum information scienceEPR paradoxCryptographyQuantum mechanics

摘要: Abstract In a series of recent experiments radical new technique has been demonstrated that could have far-reaching consequences for the way in which confidentiality and integrity our networks is protected. This technique, known as quantum cryptography, result synthesis ideas from fundamental physics classical encryption lead to approach business secure communications. We review origins developments this rapidly growing field assess current status both theory experiments.

参考文章(40)
William G. Chambers, Basics of Communications and Coding ,(1985)
Jim Napolitano, Jun John Sakurai, Modern Quantum Mechanics ,(1985)
Henry Beker, Frederick Charles Piper, J. E Hopkins, Cipher Systems: The Protection of Communications ,(1982)
Dorothy Elizabeth Robling Denning, Cryptography and data security ,(1982)
J. D. Franson, Bell inequality for position and time Physical Review Letters. ,vol. 62, pp. 2205- 2208 ,(1989) , 10.1103/PHYSREVLETT.62.2205
A. Lacaita, S. Cova, F. Zappa, P. A. Francese, Subnanosecond single-photon timing with commercially available germanium photodiodes Optics Letters. ,vol. 18, pp. 75- 77 ,(1993) , 10.1364/OL.18.000075
Stephen M. Barnett, Simon J. D. Phoenix, Information-theoretic limits to quantum cryptography. Physical Review A. ,vol. 48, ,(1993) , 10.1103/PHYSREVA.48.R5
J. G. Rarity, P. R. Tapster, Fourth-order interference effects at large distances Physical Review A. ,vol. 45, pp. 2052- 2056 ,(1992) , 10.1103/PHYSREVA.45.2052