related words |
bobs |
charlie |
sends |
share |
secret |
eavesdropping |
shared |
parties |
message |
sharing |
performs |
prepares |
teleport |
knows |
conclusive |
communicate |
sender |
eavesdropper |
receives |
teleported |
|
related documents |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
Efficient many-party controlled teleportation of multi-qubit quantum
information via entanglement [0402138v2] |
Elliptic Rydberg states as direction indicators [0305171v1] |
The Grammar of Teleportation [0509048v1] |
Limits on Efficient Computation in the Physical World [0412143v2] |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
Implications of Teleportation for Nonlocality [0103105v2] |
Synchronizing quantum clocks with classical one-way communication:
Bounds on the generated entropy [0306023v1] |
Eavesdropping on the "ping-pong" type quantum communication protocols
with invisible photon [0508002v2] |
Classical Communication via the Einstein-Podolsky-Rosen Channel Alone: A
Proposed Experimental Test [0109148v1] |
QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols [0510230v3] |
Unconditionally Secure Quantum Coin Tossing via Entanglement Swapping [0012139v2] |
Experimental Realization of Teleporting an Unknown Pure Quantum State
via Dual Classical and Einstein-Podolski-Rosen Channels [9710013v1] |
Distinguishing a set of full product bases needs only projective
measurements and classical communication [0311154v2] |
Teleportation via generalized measurements, and conclusive teleportation [9906039v1] |
Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
Correct mutual information, quantum bit error rate and secure
transmission efficiency in Wojcik's eavesdropping scheme on ping-pong
protocol [0402099v1] |
Quantum Digital Signatures [0105032v2] |
|
related topics |
{alice, bob, state} |
{key, protocol, security} |
{algorithm, log, probability} |
{theory, mechanics, state} |
{state, states, entangled} |
{information, entropy, channel} |
{bell, inequality, local} |
{photon, photons, single} |
{entanglement, phys, rev} |
{time, systems, information} |
{particle, mechanics, theory} |
{error, code, errors} |
{let, theorem, proof} |
{cos, sin, state} |
{states, state, optimal} |
{vol, operators, histories} |
{measurement, state, measurements} |
{state, phys, rev} |
{wave, scattering, interference} |
{qubit, qubits, gate} |
|