File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1364/iqec.2009.itui3
- Scopus: eid_2-s2.0-85086491559
- WOS: WOS:000274751302136
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Quantum key distribution with an untrusted source
Title | Quantum key distribution with an untrusted source |
---|---|
Authors | |
Issue Date | 2009 |
Citation | 2009 Conference on Lasers and Electro-Optics and International Quantum Electronics Conference, Baltimore, MD, 31 May-5 June 2009. In Conference Proceedings, 2009, paper ITuI3 How to Cite? |
Abstract | The "Plug & play" quantum cryptography scheme has significant advantage in real-life applications over other schemes and is adopted in most commercial quantum cryptosystems. Here, we present a rigorous security proof of it. © 2009 Optical Society of America. |
Persistent Identifier | http://hdl.handle.net/10722/285865 |
ISBN | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Yi | - |
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:51Z | - |
dc.date.available | 2020-08-18T04:56:51Z | - |
dc.date.issued | 2009 | - |
dc.identifier.citation | 2009 Conference on Lasers and Electro-Optics and International Quantum Electronics Conference, Baltimore, MD, 31 May-5 June 2009. In Conference Proceedings, 2009, paper ITuI3 | - |
dc.identifier.isbn | 9781557528698 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285865 | - |
dc.description.abstract | The "Plug & play" quantum cryptography scheme has significant advantage in real-life applications over other schemes and is adopted in most commercial quantum cryptosystems. Here, we present a rigorous security proof of it. © 2009 Optical Society of America. | - |
dc.language | eng | - |
dc.relation.ispartof | 2009 Conference on Lasers and Electro-Optics and International Quantum Electronics Conference | - |
dc.title | Quantum key distribution with an untrusted source | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1364/iqec.2009.itui3 | - |
dc.identifier.scopus | eid_2-s2.0-85086491559 | - |
dc.identifier.spage | paper ITuI3 | - |
dc.identifier.epage | paper ITuI3 | - |
dc.identifier.eissn | 2162-2701 | - |
dc.identifier.isi | WOS:000274751302136 | - |
dc.identifier.issnl | 2162-2701 | - |