{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:52:08Z","timestamp":1725483128046},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679073"},{"type":"electronic","value":"9783540445982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_30","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:15:21Z","timestamp":1178000121000},"page":"482-500","source":"Crossref","is-referenced-by-count":16,"title":["Linking Classical and Quantum Key Agreement: Is There \u201cBound Information\u201d?"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Gisin","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"issue":"6","key":"30_CR1","doi-asserted-by":"publisher","first-page":"4238","DOI":"10.1103\/PhysRevA.59.4238","volume":"59","author":"H. Bechmann-Pasquinucci","year":"1999","unstructured":"H. Bechmann-Pasquinucci and N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Phys. Rev. A, Vol. 59, No. 6, pp. 4238\u20134248, 1999.","journal-title":"Phys. Rev. A"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","volume":"76","author":"C. H. Bennett","year":"1996","unstructured":"C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, and W. K. Wooters, Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett., Vol. 76, pp. 722\u2013725, 1996.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR3","unstructured":"C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computer, Systems, and Signal Processing, IEEE, pp. 175\u2013179, 1984."},{"issue":"14","key":"30_CR4","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D. Bruss","year":"1998","unstructured":"D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., Vol. 81, No. 14, pp. 3018\u20133021, 1998.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1103\/PhysRevA.54.1844","volume":"54","author":"V. Bu\u017eek","year":"1996","unstructured":"V. Bu\u017eek and M. Hillery, Quantum copying: beyond the no-cloning theorem, Phys. Rev. A, Vol. 54, pp. 1844\u20131852, 1996.","journal-title":"Phys. Rev. A"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1103\/PhysRevLett.23.880","volume":"23","author":"J. F. Clauser","year":"1969","unstructured":"J. F. Clauser, M. A. Horne, A. Shimony and R. A. Holt, Proposed experiment to test local hidden-variable theories, Phys. Rev. Lett., Vol. 23, pp. 880\u2013884, 1969.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, Vol. IT-24, pp. 339\u2013348, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D. Deutsch","year":"1996","unstructured":"D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, Quantum privacy amplification and the security of quantum cryptography over noisy channels, Phys. Rev. Lett., Vol. 77, pp. 2818\u20132821, 1996.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal, and A. V. Thapliyal, Evidence for bound entangled states with negative partial transpose, quant-ph\/9910026, 1999.","DOI":"10.1103\/PhysRevA.61.062312"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. E. Ekert","year":"1991","unstructured":"A. E. Ekert, Quantum cryptography based on Bell\u2019s theorem, Phys. Rev. Lett., Vol. 67, pp. 661\u2013663, 1991. See also Physics World, March 1998.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1103\/PhysRevA.56.1163","volume":"56","author":"C. Fuchs","year":"1997","unstructured":"C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu, and A. Peres, Optimal eavesdropping in quantum cryptography-I: information bound and optimal strategy, Phys. Rev. A, Vol. 56, pp. 1163\u20131172, 1997.","journal-title":"Phys. Rev. A"},{"key":"30_CR12","first-page":"363","volume":"62","author":"N. Gisin","year":"1989","unstructured":"N. Gisin, Stochastic quantum dynamics and relativity, Helv. Phys. Acta, Vol. 62, pp. 363\u2013371, 1989.","journal-title":"Helv. Phys. Acta"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0375-9601(97)00083-2","volume":"228","author":"N. Gisin","year":"1997","unstructured":"N. Gisin and B. Huttner, Quantum cloning, eavesdropping, and Bell inequality, Phys. Lett. A, Vol. 228, pp. 13\u201321, 1997.","journal-title":"Phys. Lett. A"},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1103\/PhysRevLett.79.2153","volume":"79","author":"N. Gisin","year":"1997","unstructured":"N. Gisin and S. Massar, Optimal quantum cloning machines, Phys. Rev. Lett., Vol. 79, pp. 2153\u20132156, 1997.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"4200","DOI":"10.1103\/PhysRevLett.83.4200","volume":"83","author":"N. Gisin","year":"1999","unstructured":"N. Gisin and S. Wolf, Quantum cryptography on noisy channels: quantum versus classical key agreement protocols, Phys. Rev. Lett., Vol. 83, pp. 4200\u20134203, 1999.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"5239","DOI":"10.1103\/PhysRevLett.80.5239","volume":"80","author":"M. Horodecki","year":"1998","unstructured":"M. Horodecki, P. Horodecki, and R. Horodecki, Mixed-state entanglement and distillation: is there a \u201cbound\u201d entanglement in nature?, Phys. Rev. Lett., Vol. 80, pp. 5239\u20135242, 1998.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/S0375-9601(97)00416-7","volume":"232","author":"P. Horodecki","year":"1997","unstructured":"P. Horodecki, Separability criterion and inseparable mixed states with positive partial transposition, Phys. Lett. A, Vol. 232, p. 333, 1997.","journal-title":"Phys. Lett. A"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1103\/PhysRevLett.82.1056","volume":"82","author":"P. Horodecki","year":"1999","unstructured":"P. Horodecki, M. Horodecki, and R. Horodecki, Bound entanglement can be activated, Phys. Rev. Lett., Vol. 82, pp. 1056\u20131059, 1999. quant-ph\/9806058.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0375-9601(93)90880-9","volume":"183","author":"L. P. Hughston","year":"1993","unstructured":"L. P. Hughston, R. Jozsa, and W. K. Wootters, A complete classification of quantum ensembles having a given density matrix, Phys. Lett. A, Vol. 183, pp. 14\u201318, 1993.","journal-title":"Phys. Lett. A"},{"issue":"3","key":"30_CR20","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. Maurer","year":"1993","unstructured":"U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, Vol. 39, No. 3, pp. 733\u2013742, 1993.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR21","series-title":"Lect Notes Comput Sci","first-page":"352","volume-title":"Proceedings of EUROCRYPT 2000","author":"U. Maurer","year":"2000","unstructured":"U. Maurer and S. Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, pp. 352\u2013368, Springer-Verlag, 2000."},{"issue":"2","key":"30_CR22","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/18.748999","volume":"45","author":"U. Maurer","year":"1999","unstructured":"U. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, Vol. 45, No. 2, pp. 499\u2013514, 1999.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/BF02827447","volume":"51","author":"N. D. Mermin","year":"1998","unstructured":"N. D. Mermin, The Ithaca interpretation of quantum mechanics, Pramana, Vol. 51, pp. 549\u2013565, 1998.","journal-title":"Pramana"},{"key":"30_CR24","unstructured":"A. Peres, Quantum theory: concepts and methods, Kluwer Academic Publishers, 1993."},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1103\/PhysRevLett.77.1413","volume":"77","author":"A. Peres","year":"1996","unstructured":"A. Peres, Separability criterion for density matrices, Phys. Rev. Lett., Vol. 77, pp. 1413\u20131415, 1996.","journal-title":"Phys. Rev. Lett."},{"key":"30_CR26","unstructured":"S. Popescu and D. Rohrlich, Thermodynamics and the measure of entanglement, quant-ph\/9610044, 1996."},{"key":"30_CR27","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.1049\/el:19981473","volume":"34","author":"G. Ribordy","year":"1998","unstructured":"G. Ribordy, J. D. Gautier, N. Gisin, O. Guinnard, and H. Zbinden, Automated plug and play quantum key distribution, Electron. Lett., Vol. 34, pp. 2116\u20132117, 1998.","journal-title":"Electron. Lett."},{"key":"30_CR28","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, pp. 656\u2013715, 1949.","journal-title":"Bell System Technical Journal"},{"key":"30_CR29","unstructured":"S. Wolf, Information-theoretically and computationally secure key agreement in cryptography, ETH dissertation No. 13138, Swiss Federal Institute of Technology (ETH Zurich), May 1999."},{"issue":"8","key":"30_CR30","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. D. Wyner","year":"1975","unstructured":"A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355\u20131387, 1975.","journal-title":"Bell System Technical Journal"},{"key":"30_CR31","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s003400050574","volume":"67","author":"H. Zbinden","year":"1998","unstructured":"H. Zbinden, H. Bechmann, G. Ribordy, and N. Gisin, Quantum cryptography, Applied Physics B, Vol. 67, pp. 743\u2013748, 1998.","journal-title":"Applied Physics B"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:34:19Z","timestamp":1556368459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}