Literature DB >> 24670761

The ultimate physical limits of privacy.

Artur Ekert1, Renato Renner2.   

Abstract

Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

Entities:  

Mesh:

Year:  2014        PMID: 24670761     DOI: 10.1038/nature13132

Source DB:  PubMed          Journal:  Nature        ISSN: 0028-0836            Impact factor:   49.962


  23 in total

1.  Quantum cryptography based on Bell's theorem.

Authors: 
Journal:  Phys Rev Lett       Date:  1991-08-05       Impact factor: 9.161

2.  From Bell's theorem to secure quantum key distribution.

Authors:  Antonio Acín; Nicolas Gisin; Lluis Masanes
Journal:  Phys Rev Lett       Date:  2006-09-20       Impact factor: 9.161

3.  Detection-loophole-free test of quantum nonlocality, and applications.

Authors:  B G Christensen; K T McCusker; J B Altepeter; B Calkins; T Gerrits; A E Lita; A Miller; L K Shalm; Y Zhang; S W Nam; N Brunner; C C W Lim; N Gisin; P G Kwiat
Journal:  Phys Rev Lett       Date:  2013-09-26       Impact factor: 9.161

4.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

Authors:  Valerio Scarani; Renato Renner
Journal:  Phys Rev Lett       Date:  2008-05-22       Impact factor: 9.161

5.  Full randomness from arbitrarily deterministic events.

Authors:  Rodrigo Gallego; Lluis Masanes; Gonzalo De La Torre; Chirag Dhara; Leandro Aolita; Antonio Acín
Journal:  Nat Commun       Date:  2013       Impact factor: 14.919

6.  Memory attacks on device-independent quantum cryptography.

Authors:  Jonathan Barrett; Roger Colbeck; Adrian Kent
Journal:  Phys Rev Lett       Date:  2013-01-02       Impact factor: 9.161

7.  Bell violation using entangled photons without the fair-sampling assumption.

Authors:  Marissa Giustina; Alexandra Mech; Sven Ramelow; Bernhard Wittmann; Johannes Kofler; Jörn Beyer; Adriana Lita; Brice Calkins; Thomas Gerrits; Sae Woo Nam; Rupert Ursin; Anton Zeilinger
Journal:  Nature       Date:  2013-04-14       Impact factor: 49.962

8.  Classical command of quantum systems.

Authors:  Ben W Reichardt; Falk Unger; Umesh Vazirani
Journal:  Nature       Date:  2013-04-25       Impact factor: 49.962

9.  Random numbers certified by Bell's theorem.

Authors:  S Pironio; A Acín; S Massar; A Boyer de la Giroday; D N Matsukevich; P Maunz; S Olmschenk; D Hayes; L Luo; T A Manning; C Monroe
Journal:  Nature       Date:  2010-04-15       Impact factor: 49.962

10.  No extension of quantum theory can have improved predictive power.

Authors:  Roger Colbeck; Renato Renner
Journal:  Nat Commun       Date:  2011-08-02       Impact factor: 14.919

View more
  5 in total

Review 1.  DNA nanotechnology: new adventures for an old warhorse.

Authors:  Bijan Zakeri; Timothy K Lu
Journal:  Curr Opin Chem Biol       Date:  2015-06-05       Impact factor: 8.822

2.  Experimental on-demand recovery of entanglement by local operations within non-Markovian dynamics.

Authors:  Adeline Orieux; Antonio D'Arrigo; Giacomo Ferranti; Rosario Lo Franco; Giuliano Benenti; Elisabetta Paladino; Giuseppe Falci; Fabio Sciarrino; Paolo Mataloni
Journal:  Sci Rep       Date:  2015-02-25       Impact factor: 4.379

3.  Expected number of quantum channels in quantum networks.

Authors:  Xi Chen; He-Ming Wang; Dan-Tong Ji; Liang-Zhu Mu; Heng Fan
Journal:  Sci Rep       Date:  2015-07-15       Impact factor: 4.379

4.  Security of quantum key distribution with multiphoton components.

Authors:  Hua-Lei Yin; Yao Fu; Yingqiu Mao; Zeng-Bing Chen
Journal:  Sci Rep       Date:  2016-07-07       Impact factor: 4.379

5.  Practical device-independent quantum cryptography via entropy accumulation.

Authors:  Rotem Arnon-Friedman; Frédéric Dupuis; Omar Fawzi; Renato Renner; Thomas Vidick
Journal:  Nat Commun       Date:  2018-01-31       Impact factor: 14.919

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.