相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Robust self-testing of the singlet
M. McKague et al.
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL (2012)
Demonstration of Blind Quantum Computing
Stefanie Barz et al.
SCIENCE (2012)
Secure device-independent quantum key distribution with causally independent measurement devices
Lluis Masanes et al.
NATURE COMMUNICATIONS (2011)
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Ilja Gerhardt et al.
NATURE COMMUNICATIONS (2011)
Noise stability of functions with low influences: Invariance and optimality
Elchanan Mossel et al.
ANNALS OF MATHEMATICS (2010)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
USING ENTANGLEMENT IN QUANTUM MULTI-PROVER INTERACTIVE PROOFS
Julia Kempe et al.
COMPUTATIONAL COMPLEXITY (2009)
Device-independent quantum key distribution secure against collective attacks
Stefano Pironio et al.
NEW JOURNAL OF PHYSICS (2009)
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Matthew McKague
NEW JOURNAL OF PHYSICS (2009)
Universally Composable Privacy Amplification from Causality Constraints
Lluis Masanes
PHYSICAL REVIEW LETTERS (2009)
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Device-independent security of quantum cryptography against collective attacks
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2007)
Efficient quantum key distribution secure against no-signalling eavesdroppers
Antonio Acin et al.
NEW JOURNAL OF PHYSICS (2006)
No signaling and quantum key distribution
J Barrett et al.
PHYSICAL REVIEW LETTERS (2005)
PSPACE has constant-round quantum interactive proof systems
J Watrous
THEORETICAL COMPUTER SCIENCE (2003)
Simple proof of security of the BB84 quantum key distribution protocol
PW Shor et al.
PHYSICAL REVIEW LETTERS (2000)