{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:10:17Z","timestamp":1725664217024},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_14","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T15:53:44Z","timestamp":1330271624000},"page":"112-131","source":"Crossref","is-referenced-by-count":3,"title":["Quantum cryptography: Protecting our future networks with quantum mechanics"],"prefix":"10.1007","author":[{"given":"Simon J. D.","family":"Phoenix","sequence":"first","affiliation":[]},{"given":"Paul D.","family":"Townsend","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C. H. Bennett","year":"1992","unstructured":"C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, \u201cExperimental Quantum Cryptography\u201d, Journal of Cryptology, 5 3\u201328 (1992).","journal-title":"Journal of Cryptology"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"S. Wiesner, \u201cConjugate Coding\u201d, Sigact News, 15 78\u201388 (1983), original manuscript written circa 1970.","journal-title":"Sigact News"},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"P. D. Townsend","year":"1993","unstructured":"P. D. Townsend, J. G. Rarity and P. R. Tapster, \u201cSingle-Photon Interference in a 10km Long Optical Fibre Interferometer\u201d, Electronics Letters, 29 634\u2013635 (1993); P. D. Townsend, J. G. Rarity and P. R. Tapster, \u201cEnhanced Single-Photon Fringe Visibility in a 10km Long Prototype Quantum Cryptography Channel\u201d, Electronics Letters, 29 1292\u20131293 (1993); P. D Townsend and I. Thompson, \u201cA Quantum Key Distribution Channel Based on Optical Fibre\u201d, Journal of Modern Optics, 41 2425\u20132434 (1994).","journal-title":"Electronics Letters"},{"key":"14_CR4","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","volume":"23","author":"A. Muller","year":"1993","unstructured":"A. Muller, J. Breguet and N. Gisin, \u201cExperimental Demonstration of Quantum Cryptography using Polarised Photons in Optical Fibre over more than 1km\u201d, Europhysics Letters, 23 383\u2013388 (1993).","journal-title":"Europhysics Letters"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1049\/el:19940558","volume":"30","author":"P. D. Townsend","year":"1994","unstructured":"P. D. Townsend, \u201cSecure Key Distribution System Based on Quantum Cryptography\u201d, Electronics Letters, 30 809\u2013810 (1994); C. Marand and P. D. Townsend, \u201cQuantum Key Distribution Over Distances as long as 30km\u201d, Optics Letters, 20 1695\u20131697 (1995).","journal-title":"Electronics Letters"},{"key":"14_CR6","doi-asserted-by":"crossref","first-page":"2949","DOI":"10.1364\/AO.33.002949","volume":"33","author":"J. D. Franson","year":"1994","unstructured":"J. D. Franson and H. Ilves, \u201cQuantum Cryptography using Optical Fibres\u201d, Applied Optics, 33 2949\u20132954 (1994); J. D. Franson and H. Ilves, \u201cQuantum Cryptography using Polarisation Feedback\u201d, Journal of Modern Optics, 41 2391\u20132396 (1994).","journal-title":"Applied Optics"},{"key":"14_CR7","unstructured":"R. J. Hughes, G. G. Luther, G. L. Morgan and C. Simmons \u201cQuantum Cryptography over 14km of Installed Optical Fibre\u201d, to be published in \u201cProceedings of the Seventh Rochester Conference on Coherence and Quantum Optics\u201d."},{"key":"14_CR8","unstructured":"C. H. Bennett and G. Brassard, \u201cQuantum Cryptography: Public-Key Distribution and Coin Tossing\u201d, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175\u2013179 (1984)."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W. K. Wootters","year":"1982","unstructured":"W. K. Wootters and W. H. Zurek, \u201cA Single Quantum Cannot be Cloned\u201d, Nature, 299 802\u2013803 (1982).","journal-title":"Nature"},{"key":"14_CR10","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1103\/PhysRevA.48.96","volume":"48","author":"S. J. D. Phoenix","year":"1993","unstructured":"S. J. D. Phoenix, \u201cQuantum Cryptography without Conjugate Coding\u201d, Physical Review A, 48 96\u2013102 (1993).","journal-title":"Physical Review A"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. H. Bennett","year":"1988","unstructured":"C. H. Bennett, G. Brassard and J.-M. Robert, \u201cPrivacy Amplification by Public Discussion\u201d, SIAM Journal on Computing, 17 210\u2013229 (1988). The procedure is also outlined in reference [1]; C. H. Bennett, G. Brassard, C. Crepeau and U. M. Maurer, \u201cGeneralised Privacy Amplification\u201d, IEEE Transactions on Information Theory, in press.","journal-title":"SIAM Journal on Computing"},{"key":"14_CR12","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C. H. Bennett","year":"1992","unstructured":"C. H. Bennett, \u201cQuantum Cryptography Using Any Two Non-Orthogonal States\u201d, Physical Review Letters, 68 3121\u20133124 (1992).","journal-title":"Physical Review Letters"},{"key":"14_CR13","doi-asserted-by":"crossref","first-page":"R5","DOI":"10.1103\/PhysRevA.48.R5","volume":"48","author":"S. M. Barnett","year":"1993","unstructured":"S. M. Barnett and S. J. D. Phoenix, \u201cInformation-Theoretic Limits to Quantum Cryptography\u201d, Physical Review A, 48 R5\u2013R8 (1993); S. M. Barnett, B. Huttner and S. J. D. Phoenix, \u201cEavesdropping Strategies and Rejected-Data Protocols in Quantum Cryptography\u201d, Journal of Modern Optics, 40 2501\u20132513 (1993).","journal-title":"Physical Review A"},{"key":"14_CR14","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. K. Ekert","year":"1991","unstructured":"A. K. Ekert, \u201cQuantum Cryptography Based on Bell's Theorem\u201d, Physical Review Letters, 67 661\u2013663 (1991).","journal-title":"Physical Review Letters"},{"key":"14_CR15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"J. S. Bell","year":"1964","unstructured":"J. S. Bell, \u201cOn the Einstein-Podolsky-Rosen Paradox\u201d, Physics, 1 195\u2013200 (1964).","journal-title":"Physics"},{"key":"14_CR16","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1080\/09500349314551511","volume":"40","author":"S. M. Barnett","year":"1993","unstructured":"S. M. Barnett and S. J. D. Phoenix, \u201cBell's Inequality and Rejected-Data Protocols for Quantum Cryptography\u201d, Journal of Modern Optics, 40 1443\u20131448 (1993).","journal-title":"Journal of Modern Optics"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1049\/el:19941255","volume":"30","author":"P. D. Townsend","year":"1994","unstructured":"P. D. Townsend, S. J. D. Phoenix, K. J. Blow and S. M. Barnett, \u201cDesign of Quantum Cryptography Systems for Passive Optical Networks\u201d, Electronics Letters, 30 1875\u20131877 (1994); S. J. D. Phoenix, S. M. Barnett, P. D. Townsend and K. J. Blow, \u201cMulti-User Quantum Cryptography on Optical Networks\u201d, Journal of Modern Optics, 42 1155\u20131163 (1995).","journal-title":"Electronics Letters"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"P. Shor, \u201cAlgorithms for Quantum Computation: Discrete Logarithms and Factoring\u201d in Proceedings of the 35th Annual Symposium on Foundations of Computer Science (IEEE Computer Society Press, 1994) pp. 124\u2013134.","DOI":"10.1109\/SFCS.1994.365700"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:27:04Z","timestamp":1619558824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}