Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,331,517 papers from all fields of science
Search
Sign In
Create Free Account
Six-State Protocol
Six-State Protocol (SSP) is the quantum cryptography protocol that is the version of BB84 that uses a six-state polarization scheme on three…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
BB84
Noisy-storage model
Quantum cloning
Quantum cryptography
Expand
Broader (1)
Quantum information science
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
B. Othmani
,
Mohsen Machhout
,
H. Mejri
,
H. Belmabrouk
,
R. Tourki
2012
Corpus ID: 5194121
The intrusion based on Buek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the…
Expand
2012
2012
Secret key rates for coherent attacks
Markus Mertz
,
H. Kampermann
,
Sylvia Bratzik
,
D. Bruß
2012
Corpus ID: 119221272
We develop a new method to quantify the secret key rate for permutation-invariant protocols for coherent attacks and finite…
Expand
2012
2012
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB 84 Protocol
Arpita Maitra
,
G. Paul
2012
Corpus ID: 14744829
The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and X = {|+〉, |−〉}, where |+〉 = |0〉+|1〉 √ 2 and |−〉 = |0…
Expand
2011
2011
Finite-key analysis of the six-state protocol with photon number resolution detectors
Silvestre Abruzzo
,
Markus Mertz
,
H. Kampermann
,
D. Bruß
Security and Defence
2011
Corpus ID: 118674207
The six-state protocol is a discrete-variable protocol for quantum key distribution, that permits to tolerate a noisier channel…
Expand
2009
2009
New Journal of Physics Detector decoy quantum key distribution
T. Moroder
,
M. Curty
,
N. Lütkenhaus
2009
Corpus ID: 8548455
Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we…
Expand
2009
2009
Research Activities in Quantum Cryptography and Security Analysis
T. Hasegawa
,
T. Tsurumaru
2009
Corpus ID: 15980028
1. Introduction Quantum cryptography is a technology that ensures ultimate security 1). Compared to current cryptography that…
Expand
2009
2009
Quantum Key Distribution Highly Sensitive to Eavesdropping
S. Brierley
2009
Corpus ID: 118966221
We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It…
Expand
2008
2008
Efficient and robust quantum key distribution with minimal state tomography
B. Englert
,
D. Kaszlikowski
,
H. Ng
,
Wee Kang Chua
,
Janet Anders
2008
Corpus ID: 265099741
(4/3) = 0.415 key bits per qubit sent. This is 25% more than theefficiency of 1/3 = 0.333 for the standard six-state protocol…
Expand
Review
2007
Review
2007
A Survey on Quantum Cryptographic Protocols and Their Security
C. Fung
,
H. Lo
Canadian Conference on Electrical and Computer…
2007
Corpus ID: 14754821
Communications in secrecy are often required in many commercial and military applications. Unfortunately, many cryptographic…
Expand
2005
2005
Eavesdropping on practical QKD system based on six-state protocol
Li Jing-feng
,
Tang Zhi-lie
,
+5 authors
Liu Song-hao
2005
Corpus ID: 120974369
Based on practical implementations of quantum cryptography with the attenuated laser pulses as the signal source rather than…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE