| related words |
| tamaki |
| authentic |
| partys |
| bessette |
| malicious |
| preskills |
| sealing |
| randomize |
| breeding |
| achievability |
| nordholt |
| intercepted |
| secrets |
| buttler |
| attacker |
| password |
| decrypt |
| cheaters |
| authenticate |
| vernam |
|
| related documents |
| Security Trade-offs in Ancilla-Free Quantum Bit Commitment in the
Presence of Superselection Rules [0405111v2] |
| Cheat Sensitive Quantum Bit Commitment [9911043v5] |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols [0510230v3] |
| Unambiguous discrimination of special sets of multipartite states using
local measurements and classical communication [0501174v1] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {algorithm, log, probability} |
| {states, state, optimal} |
| {group, space, representation} |
| {information, entropy, channel} |
| {photon, photons, single} |
| {bell, inequality, local} |
| {let, theorem, proof} |
| {error, code, errors} |
| {theory, mechanics, state} |
| {vol, operators, histories} |
| {state, phys, rev} |
| {observables, space, algebra} |
| {energy, gaussian, time} |
| {state, states, entangled} |
| {field, particle, equation} |
| {cavity, atom, atoms} |
| {classical, space, random} |
| {light, field, probe} |
|