V.  QUANTUM INFORMATION

A.  Quantum cryptography

1.  General

[Wiesner 83] (first description of quantum coding, along with two applications: making money that is in principle impossible to counterfeit, and multiplexing two or three messages in such a way that reading one destroys the others), [Bennett 84], [Bennett-Brassard 84] (BB84 scheme for quantum key distribution (QKD)), [Deutsch 85 b, 89 b], [Ekert 91 a, b, 92] (E91 scheme: QKD using EPR pairs), [Bennett-Brassard-Mermin 92] (E91 is in practice equivalent to BB84: Entanglement is not essential for QKD, and Bell's inequality is not essential for the detection of eavesdropping), [Bennett-Brassard-Ekert 92], [Bennett 92 a] (B92 scheme: Using two nonorthogonal states), [Ekert-Rarity-Tapster-Palma 92], [Bennett-Wiesner 92], [Phoenix 93], [Muller-Breguet-Gisin 93], [Franson 93], (one-to-any QKD:) [Townsend-Smith 93], [Townsend-Blow 93], [Townsend-Phoenix-Blow-Barnett 94]; (any-to-any QKD:) [Barnett-Phoenix 94], [Phoenix-Barnett-Townsend-Blow 95]; [Barnett-Loudon-Pegg-Phoenix 94], [Franson-Ilves 94 a], [Huttner-Peres 94], [Breguet-Muller-Gisin 94], [Ekert-Palma 94], [Townsend-Thompson 94], [Rarity-Owens-Tapster 94], [Huttner-Ekert 94], [Huttner-Imoto-Gisin-Mor 95], [Hughes-Alde-Dyer-(+3) 95] (excellent review), [Phoenix-Townsend 95], [Ardehali 96] (QKD based on delayed choice), [Koashi-Imoto 96] (using two mixed states), [Hughes 97], [Townsend 97 a, 99] (scheme for QKD for several users by means of an optical fibre network), [Biham-Mor 97] (security of QC against collective attacks), [Klyshko 97], [Fuchs-Gisin-Griffiths-(+2) 97], [Brandt-Myers-Lomonaco 97], [Hughes 97 b] (relevance of quantum computation for crytography), [Lütkenhaus-Barnett 97], [Tittel-Ribordy-Gisin 98] (review), [Williams-Clearwater 98] (book with a chapter on QC), [Mayers-Yao 98], [Slutsky-Rao-Sun-Fainman 98] (security against individual attacks), [Lo-Chau 98 b, c, 99], [Ardehali-Chau-Lo 98] (see also [Lo-Chau-Ardehale 00]), [Zeng 98 a], [Molotkov 98 c] (QC based on photon "frequency" states), [Lomonaco 98] (review), [Lo 98] (excellent review on quantum cryptology -the art of secure communications using quantum means-, both from the perspective of quantum cryptography -the art of quantum code-making- and quantum cryptoanalysis -the art of quantum code-breaking-), [Ribordy-Gautier-Gisin-(+2) 98] (automated `plug & play' QKD), [Mitra 98], (free-space practical QC:) [Hughes-Nordholt 99], [Hughes-Buttler-Kwiat-(+4) 99], [Hughes-Buttler-Kwiat-(+5) 99]; [Lütkenhaus 99] (estimates for practical QC), [Guo-Shi 99] (QC based on interaction-free measurements), [Czachor 99] (QC with polarizing interferometers), [Kempe 99] (multiparticle entanglement and its applications to QC), [Sergienko-Atatüre-Walton(+3) 99] (QC using parametric down-conversion), [Gisin-Wolf 99] (quantum versus classical key-agreement protocols), [Zeng 00] (QKD based on GHZ state), [Zeng-Wang-Wang 00] (QKD relied on trusted information center), [Zeng-Guo 00] (authentication protocol), [Ralph 00 a] (continuous variable QC), [Hillery 00] (QC with squeezed states), [Zeng-Zhang 00] (identity verification in QKD), [Bechmann Pasquinucci-Peres 00] (QC with 3-state systems), [Cabello 00 c] (QKD without alternative measurements using entanglement swapping, see also [Zhang-Li-Guo 01 a], [Cabello 01 b, e]), [Bouwmeester-Ekert-Zeilinger 00] (book on quantum information), [Brassard-Lütkenhaus-Mor-Sanders 00] (limitations on practical QC), [Phoenix-Barnett-Chefles 00] (three-state QC), [Nambu-Tomita-Chiba Kohno-Nakamura 00] (QKD using two coherent states of light and their superposition), [Cabello 00 f] (classical capacity of a quantum channel can be saturated with secret information), [Bub 01 a] (QKD using a pre- and postselected states). [Xue-Li-Guo 01, 02] (efficient QKD with nonmaximally entangled states), [Gisin-Ribordy-Tittel-Zbinden 01] (review), [Guo-Li-Shi-(+2) 01] (QKD with orthogonal product states), [Beige-Englert-Kurtsiefer-Weinfurter 01 a, b], [Long-Liu 02] (QKD in which each EPR pair carries 2 bits), [Klarreich 02] (commercial QKD: ID Quantique, MagiQ Technologies, BBN Technologies), [Buttler-Torgerson-Lamoreaux 02] (new fiber-based quantum key distribution schemes).

2.  Proofs of security

[Lo-Chau 99], [Mayers 96 b, 01, 02 a], [Biham-Boyer-Boykin-(+2) 00], [Shor-Preskill 00] (simple proof of security of the BB84), [Tamaki-Koashi-Imoto 03 a, b] (B92), [Hwang-Wang-Matsumoto-(+2) 03 a] (Shor-Preskill type security-proof without public announcement of bases), [Tamaki-Lütkenhaus 03] (B92 over a lossy and noisy channel).

3.  Quantum eavesdropping

[Werner-Milburn 93], [Barnett-Huttner-Phoenix 93] (eavesdropping strategies), [Ekert-Huttner-Palma-Peres 94], [Huttner-Ekert 94], [Fuchs-Gisin-Griffiths-Niu-Peres 97], [Brandt-Myers-Lomonaco 97], [Gisin-Huttner 97], [Griffiths-Niu 97], [Cirac-Gisin 97], [Lütkenhaus-Barnett 97], [Bruß 98], [Niu-Griffiths 98 a] (optimal copying of one qubit), [Zeng-Wang 98] (attacks on BB84 protocol), [Zeng 98 b] (id.), [Bechmann Pasquinucci-Gisin 99], [Niu-Griffiths 99] (two qubit copying machine for economical quantum eavesdropping), [Brandt 99 a] (eavesdropping optimization using a positive operator-valued measure), [Lütkenhaus 00] (security against individual attacks for realistic QKD), [Hwang-Ahn-Hwang 01 b] (eavesdropper's optimal information in variations of the BB84 in the coherent attacks).

4.  Quantum key distribution with orthogonal states

[Goldenberg-Vaidman 95 a] (QC with orthogonal states) ([Peres 96 f], [Goldenberg-Vaidman 96]), [Koashi-Imoto 97, 98 a], [Mor 98 a] (if the individual systems go one after another, there are cases in which even orthogonal states cannot be cloned), [Cabello 00 f] (QKD in the Holevo limit).

5.  Experiments

[Bennett-Bessette-Brassard-(+2) 92] (BB84 over 32 cm through air), [Townsend-Rarity-Tapster 93 a, b], [Muller-Breguet-Gisin 93] (B92 through more than 1 km of optical fibre), [Townsend 94], [Muller-Zbinden-Gisin 95] (B92 through 22.8 km of optical fibre), [Marand-Townsend 95] (with phase-encoded photons over 30 km), [Franson-Jacobs 95], [Hughes-Luther-Morgan-(+2) 96] (with phase-encoded photons), [Muller-Zbinden-Gisin 96] (real experiment through 26 km of optical fibre), [Zbinden 98] (review of different experimental setups based on optical fibres), (`plug and play' QKD:) [Muller-Herzog-Huttner-(+3) 97], [Ribordy-Gautier-Gisin-(+2) 98]; (quantum key transmision through 1 km of atmosphere:) [Buttler-Hughes-Kwiat-(+6) 98], [Buttler-Hughes-Kwiat-(+5) 98], [Hughes-Buttler-Kwiat-(+4) 99], [Hughes-Nordholt 99] (B92 at a rate of 5 kHz and over 0.5 km in broad daylight and free space, with polarized photons), [Gisin-Brendel-Gautier-(+5) 99], [Mérolla-Mazurenko-Goedgebuer-(+3) 99] (quantum cryptographic device using single-photon phase modulation), [Hughes-Morgan-Peterson 00] (48 km), [Buttler-Hughes-Lamoreaux-(+3) 00] (daylight quantum key distribution over 1.6 km), [Jennewein-Simon-Weihs-(+2) 00] (E91 with individual photons entangled in polarization), [Naik-Peterson-White-(+2) 00] (E91 with individual photons entangled in polarization from parametric down-conversion), [Tittel-Brendel-Zbinden-Gisin 00] (with individual photons in energy-time Bell states), [Ribordy-Brendel-Gautier-(+2) 01] (long-distance entanglement-based QKD), [Stucki-Gisin-Guinnard-(+2) 02] (over 67 km with a plug & play system), [Hughes-Nordholt-Derkacs-Peterson 02] (over 10 km in daylight and at night), [Kurtsiefer-Zarda-Halder-(+4) 02] (over a free-space path of 23.4 km between the summit of Zugspitze and Karwendelspitze, Nature), [Waks-Inoue-Santori-(+4) 02] (quantum cryptography with a photon turnstile, Nature).

6.  Commercial quantum cryptography

[ID Quantique 01], [MagiQ Technologies 02], [QinetiQ 02], [Telcordia Technologies 02], [BBN Technologies 02].

B.  Cloning and deleting quantum states

[Wootters-Zurek 82] (due to the linearity of QM, there is no universal quantum cloner -a device for producing two copies from an arbitrary initial state- with fidelity 1), [Dieks 82], [Herbert 82] (superluminal communication would be possible with a perfect quantum cloner), [Barnum-Caves-Fuchs-(+2) 96] (noncomuting mixed states cannot be broadcast), [Buzek-Hillery 96] (it is possible to build a cloner which produces two approximate copies of an arbitrary initial state, the maximum fidelity for that process is [5/6]), [Hillery-Buzek 97] (fundamental inequalities in quantum copying), [Gisin-Massar 97] (optimal cloner which makes m copies from n copies of the original state), [Bruß-DiVincenzo-Ekert-(+2) 98] (the maximum fidelity of a universal quantum cloner is [5/6]), [Moussa 97 b] (proposal for a cloner based on QED), [Bruß-Ekert-Macchiavello 98], [Gisin 98] ([5/6] is the maximum fidelity of a universal quantum cloner, supposing that it cannot serve for superluminial transmission of information), [Mor 98 a] (if the individual systems go one after another, there are cases in which even orthogonal states cannot be cloned), [Koashi-Imoto 98 a] (necessary and sufficient condition for two pure entangled states to be clonable by sequential access to both systems), [Westmoreland-Schumacher 98], [Mashkevich 98 b, d], [van Enk 98] (no-cloning and superluminal signaling), [Cerf 98 b] (generalization of the cloner proposed by Hillery and Buzek in case that the two copies are not identical; the inequalities that govern the fidelity of this process), [Werner 98] (optimal cloning of pure states), [Zanardi 98 b] (cloning in d dimensions), [Cerf 98 c] (asymmetric cloning), [Duan-Guo 98 c, f] (probabilistic cloning), [Keyl-Werner 98] (judging single clones), [Buzek-Hillery 98 a, b] (universal optimal cloning of qubits and quantum registers), [Buzek-Hillery-Bednik 98], [Buzek-Hillery-Knight 98], [Chefles-Barnett 98 a, b], [Masiak-Knight 98] (copying of entangled states and the degradation of correlations), [Niu-Griffiths 98] (two qubit copying machine for economical quantum eavesdropping), [Bandyopadhyay-Kar 99], [Ghosh-Kar-Roy 99] (optimal cloning), [Hardy-Song 99] (no signalling and probabilistic quantum cloning), [Murao-Jonathan-Plenio-Vedral 99] (quantum telecloning: a process combining quantum teleportation and optimal quantum cloning from one input to M outputs), [Dür-Cirac 00 b] (telecloning from N inputs to M outputs), [Albeverio-Fei 00 a] (on the optimal cloning of an N-level quantum system), [Macchiavello 00 b] (bounds on the efficiency of cloning for two-state quantum systems), [Zhang-Li-Wang-Guo 00] (probabilistic quantum cloning via GHZ states), [Pati 00 a] (assisted cloning and orthogonal complementing of an unknown state), [Pati-Braunstein 00 a] (impossibility of deleting an unknown quantum state: If two photons are in the same initial polarization state, there is no mechanism that produces one photon in the same initial state and another in some standard polarization state), [Simon-Weihs-Zeilinger 00 a, b] (optimal quantum cloning via stimulated emission), [Cerf 00 a] (Pauli cloning), [Pati 00 b], [Zhang-Li-Guo 00 b] (cloning for n-state system), [Cerf-Ipe-Rottenberg 00] (cloning of continuous variables), [Cerf 00 b] (asymmetric quantum cloning in any dimension), [Kwek-Oh-Wang-Yeo 00] (Buzek-Hillery cloning revisited using the bures metric and trace norm), [Galvão-Hardy 00 b] (cloning and quantum computation), [Kempe-Simon-Weihs 00] (optimal photon cloning), [Cerf-Iblisdir 00] (optimal N-to-M cloning of conjugate quantum variables), [Fan-Matsumoto-Wadati 01 b] (cloning of d-level systems), [Roy-Sen-Sen 01] (is it possible to clone using an arbitrary blank state?), [Bruß-Macchiavello 01 a] (optimal cloning for two pairs of orthogonal states), [Fan-Matsumoto-Wang-(+2) 01] (a universal cloner allowing the input to be arbitrary states in symmetric subspace), [Fan-Wang-Matsumoto 02] (a quantum-copying machine for equatorial qubits), [Rastegin 01 a, b, 03 a] (some bounds for quantum copying), [Cerf-Durt-Gisin 02] (cloning a qutrit), [Segre 02] (no cloning theorem versus the second law of thermodynamics), [Feng-Zhang-Sun-Ying 02] (universal and original-preserving quantum copying is impossible), [Qiu 02 c] (non-optimal universal quantum deleting machine), [Ying 02 a, b], [Han-Zhang-Guo 02 b] (bounds for state-dependent quantum cloning), [Rastegin 03 b] (limits of state-dependent cloning of mixed states), [Pati-Braunstein 03 b] (deletion of unknown quantum state against a copy can lead to superluminal signalling, but erasure of unknown quantum state does not imply faster than light signalling), [Horodecki-Horodecki-Sen De-Sen 03] (no-deleting and no-cloning principles as consequences of conservation of quantum information), [Horodecki-Sen De-Sen 03 b] (orthogonal pure states can be cloned and deleted. However, for orthogonal mixed states deletion is forbidden and cloning necessarily produces an irreversibility, in the form of leakage of information into the environment), [Peres 02] (why wasn't the no-cloning theorem discovered fifty years earlier?).

C.  Quantum bit commitment

[Brassard-Crépeau-Jozsa-Langlois 93], [Mayers 97] (unconditionally secure QBC is impossible), [Brassard-Crépeau-Mayers-Salvail 97] (review on the impossibility of QBC), [Kent 97 b, 99 a, c, d, 00 a, 01 a, b], [Lo-Chau 96, 97, 98 a, d], [Brassard-Crépeau-Mayers-Salvail 98] (defeating classical bit commitments with a quantum computer), [Hardy-Kent 99] (cheat sensitive QBC), [Molotkov-Nazin 99 c] (unconditionally secure relativistic QBC), [Bub 00 b], [Yuen 00 b, c, 01 a, c] (unconditionally secure QBC is possible), [Nambu-Chiba Kohno 00] (information-theoretic description of no-go theorem of a QBC), [Molotkov-Nazin 01 b] (relativistic QBC) [Molotkov-Nazin 01 c] (QBC in a noisy channel), [Li-Guo 01], [Spekkens-Rudolph 01 a] (degrees of concealment and bindingness in QBC protocols), [Spekkens-Rudolph 01 b] (optimization of coherent attacks in generalizations of the BB84 QBC protocol), [Cheung 01] (QBC can be unconditionally secure), [Srikanth 01 f], [Bub 01 b] (review), [Shimizu-Imoto 02 a] (fault-tolerant simple QBC unbreakable by individual attacks), [Nayak-Shor 03] (bit-commitment-based quantum coin flipping), [Srikanth 03].

D.  Secret sharing and quantum secret sharing

[Żukowski-Zeilinger-Horne-Weinfurter 98], [Hillery-Buzek-Berthiaume 99] (one- to two-party SS and QSS using three-particle entanglement, and one- to three-party SS using four-particle entanglement), [Karlsson-Koashi-Imoto 99] (one- to two-party SS using two-particle entanglement, and QSS using three-particle entanglement), [Cleve-Gottesman-Lo 99] (in a (k, n) threshold scheme, a secret quantum state is divided into n shares such that any k shares can be used to reconstruct the secret, but any set of k-1 shares contains no information about the secret. The "no-cloning theorem" requires that n < 2k), [Tittel-Zbinden-Gisin 99] (QSS using pseudo-GHZ states), [Smith 00] (QSS for general access structures), [Bandyopadhyay 00 b], [Gottesman 00 a] (theory of QSS), [Karimipour-Bagherinezhad-Bahraminasab 02 b] (SS).

E.  Quantum authentication

[Ljunggren-Bourennane-Karlsson 00] (authority-based user authentication in QKD), [Zeng-Guo 00] (QA protocol), [Zhang-Li-Guo 00 c] (QA using entangled state), [Jensen-Schack 00] (QA and QKD using catalysis), [Shi-Li-Liu-(+2) 01] (QKD and QA based on entangled state), [Guo-Li-Guo 01] (non-demolition measurement of nonlocal variables and its application in QA), [Curty-Santos 01 a, c], [Barnum 01] (authentication codes), [Curty-Santos-Pérez-García Fernández 02], [Kuhn 03] (QA using entanglement and symmetric cryptography).

F.  Teleportation of quantum states

1.  General

[Bennett-Brassard-Crépeau-(+3) 93], [Sudbery 93] (News and views, Nature), [Deutsch-Ekert 93], [Popescu 94], [Vaidman 94 a], [Davidovich-Zagury-Brune-(+2) 94], [Cirac-Parkins 94], [Braunstein-Mann 95], [Vaidman 95 c], [Popescu 95], [Gisin 96 b], [Bennett-Brassard-Popescu-(+3) 96], [Horodecki-Horodecki-Horodecki 96 b], [Horodecki-Horodecki 96 b], [Taubes 96], [Braunstein 96 a], [Home 97] (Sec. 4. 4), [Moussa 97 a], [Nielsen-Caves 97] (reversible quantum operations and their application to T), [Zheng-Guo 97 a, b], [Watson 97 b], [Anonymous 97], [Williams-Clearwater 98] (book with a chapter on T), [Brassard-Braunstein-Cleve 98] (T as a quantum computation), [Braunstein-Kimble 98 a] (T of continuous quantum variables), [Collins 98] (Phys. Today), [Pan-Bouwmeester-Weinfurter-Zeilinger 98], [García Alcaine 98 a] (review), [Klyshko 98 c] (on the realization and meaning of T), [Molotkov 98 a] (T of a single-photon wave packet), [de Almeida-Maia-Villas Bôas-Moussa 98] (T of atomic states with cavities), [Ralph-Lam 98] (T with bright squeezed light), [Horodecki-Horodecki-Horodecki 99 c] (general T channel, singlet fraction and quasi-distillation), [Vaidman 98 c] (review of all proposals and experiments, and T in the many-worlds interpretation), [Zubairy 98] (T of a field state), [Nielsen-Knill-Laflamme 98] (complete quantum T using nuclear magnetic resonance), [Stenholm-Bardroff 98] (T of N-dimensional states), [Karlsson-Bourennane 98] (T using three-particle entanglement), [Plenio-Vedral 98] (T, entanglement and thermodynamics), [Ralph 98] (all optical quantum T), [Maierle-Lidar-Harris 98] (T of superpositions of chirial amplitudes), [Vaidman-Yoran 99] (methods for reliable T), [Lütkenhaus-Calsamiglia-Suominen 99] (a never-failing measurement of the Bell operator in a two two-level bosonic system is impossible with beam splitters, phase shifters, delay lines, electronically switched linear elements, photo-detectors, and auxiliary bosons), [Linden-Popescu 99] (bound entanglement and T), [Molotkov-Nazin 99 b] (on T of continuous variables), [Tan 99] (confirming entanglement in continuous variable quantum T), [Villas Bôas-de Almeida-Moussa 99] (T of a zero- and one-photon running-wave state by projection synthesis), [van Enk 99] (discrete formulation of T of continuous variables), [Milburn-Braunstein 99] (T with squeezed vacuum states), [Ryff 99], [Koniorczyk-Janszky-Kis 99] (photon number T), [Bose-Knight-Plenio-Vedral 99] (proposal for T of an atomic state via cavity decay), [Ralph-Lam-Polkinghorne 99] (characterizing T in optics), [Maroney-Hiley 99] (T understood through the Bohm interpretation), [Hardy 99 b] (a toy local theory in which cloning is not possible but T is), [Parkins-Kimble 99] (T of the wave function of a massive particle), [Marinatto-Weber 00 b] (which kind of two-particle states can be teleported through a three-particle quantum channel?), [Bouwmeester-Pan-Weinfurter-Zeilinger 00] (high-fidelity T of independent qubits), [Zeilinger 00 c], [van Loock-Braunstein 00 a] (T of continuous-variable entanglement), [Banaszek 00] (optimal T with an arbitrary pure state), [Opatrný-Kurizki-Welsch 00] (improvement on T of continuous variables by photon subtraction via conditional measurement), [Horoshko-Kilin 00] (T using quantum nondemolition technique), [Murao-Plenio-Vedral 00] (T of quantum information to N particles), [Li-Li-Guo 00] (probabilistic T and entanglement matching), [Cerf-Gisin-Massar 00] (classical T of a qubit), [DelRe-Crosignani-Di Porto 00] (scheme for total T), [Kok-Braunstein 00 a] (postselected versus nonpostselected T using parametric down-conversion), [Bose-Vedral 00] (mixedness and T), [van Loock-Braunstein 00 b] (multipartite entanglement for continuous variables: A quantum T network), [Braunstein-D'Ariano-Milburn-Sacchi 00] (universal T with a twist), [Bouwmeester-Ekert-Zeilinger 00] (book on quantum information), [Dür-Cirac 00 b] (multiparty T), [Henderson-Hardy-Vedral 00] (two-state T), [Motoyoshi 00] (T without Bell measurements), [Vitali-Fortunato-Tombesi 00] (complete T with a Kerr nonlinearity), [Galvão-Hardy 00 a] (building multiparticle states with T), [Banaszek 00 a] (optimal T with an arbitrary pure state), [Lee-Kim 00] (entanglement T via Werner states), [Lee-Kim-Jeong 00] (transfer of nonclassical features in T via a mixed quantum channel), [Żukowski 00 b] (Bell's theorem for the nonclassical part of the T process), [Clausen-Opatrný-Welsch 00] (conditional T using optical squeezers), [Grangier-Grosshans 00 a] (T criteria for continuous variables), [Koniorczyk-Kis-Janszky 00], [Gorbachev-Zhiliba-Trubilko-Yakovleva 00] (T of entangled states and dense coding using a multiparticle quantum channel), [van Loock-Braunstein 00 d] (telecloning and multiuser quantum channels for continuous variables), [Hao-Li-Guo 00] (probabilistic dense coding and T), [Zhou-Hou-Zhang 01] (T of S-level pure states by two-level EPR states), [Trump-Bruß-Lewenstein 01] (realistic T with linear optical elements), [Werner 01 a] (T and dense coding schemes), [Ide-Hofmann-Kobayashi-Furusawa 01] (continuous variable T of single photon states), [Wang-Feng-Gong-Xu 01] (atomic-state T by using a quantum switch), [Braunstein-Fuchs-Kimble-van Loock 01] (quantum versus classical domains for T with continuous variables), [Bowen-Bose 01] (T as a depolarizing quantum channel), [Shi-Tomita 02] (T using a W state), [Agrawal-Pati 02] (probabilistic T), [Yeo 03 a] (T using a three-qubit W state), [Peres 03 b] (it includes a narrative of how Peres remembers that T was conceived).

2.  Experiments

[Boschi-Branca-De Martini-(+2) 98] (first experiment), [Bouwmeester-Pan-Mattle-(+3) 97] (first published experiment), [Furusawa-Sørensen-Braunstein-(+3) 98], (first T of a state that describes a light field, see also [Caves 98 a]), [Sudbery 97] (News and views, Nature), (Comment: [Braunstein-Kimble 98 b], Reply: [Bouwmeester-Pan-Daniell-(+3) 98]), (discussion on which group did the first experiment:) [De Martini 98 a], [Zeilinger 98 a]; [Koenig 00] (on Vienna group's experiments on T), [Kim-Kulik-Shih 01 a] (T experiment of an unknown arbitrary polarization state in which nonlinear interactions are used for the Bell state measurements and in which all four Bell states can be distinguished), [Pan-Daniell-Gasparoni-(+2) 01] (four-photon entanglement and high-fidelity T), [Lombardi-Sciarrino-Popescu-De Martini 02] (T of a vacuum-one-photon qubit), [Kim-Kulik-Shih 02] (proposal for an experiment for T with a complete Bell state measurements using nonlinear interactions), [Marcikic-de Riedmatten-Tittel-(+2) 03] (experimental probabilistic quantum teleportation: Qubits carried by photons of 1.3 mm wavelength are teleported onto photons of 1.55 mm wavelength from one laboratory to another, separated by 55 m but connected by 2 km of standard telecommunications fibre, Nature), [Pan-Gasparoni-Aspelmeyer-(+2) 03] (Nature).

G.  Telecloning

[Murao-Jonathan-Plenio-Vedral 99] (quantum telecloning: a process combining quantum teleportation and optimal quantum cloning from one input to M outputs), [Dür-Cirac 00 b] (telecloning from N inputs to M outputs), [van Loock-Braunstein 00 d] (telecloning and multiuser quantum channels for continuous variables), [van Loock-Braunstein 01] (telecloning of continuous quantum variables), [Ghiu 03] (asymmetric quantum telecloning of d-level systems), [Ricci-Sciarrino-Sias-De Martini 03 a, b] (experimental results).

H.  Dense coding

[Bennett-Wiesner 92] (encoding n2 values in a n-level system), [Deutsch-Ekert 93] (popular review), [Barnett-London-Pegg-Phoenix 94] (communication using quantum states), [Barenco-Ekert 95] (the Bennett-Wiesner scheme for DC based on the discrimination of the four Bell states is the optimal one, i.e. it maximizes the mutual information, even if the initial state is not a Bell state but a non-maximally entangled state), [Mattle-Weinfurter-Kwiat-Zeilinger 96] (experimeltal transmission of a "trit" using a two-level quantum system, with photons entangled in polarization), [Huttner 96] (popular review of the MWKZ experiment), [Cerf-Adami 96] (interpretation of the DC in terms of negative information), [Bose-Vedral-Knight 99] (Sec. V. B, generalization with several particles and several transmitters), [Bose-Plenio-Vedral 98] (with mixed states), [Shimizu-Imoto-Mukai 99] (DC in photonic quantum communication with enhanced information capacity), [Ban 99 c] (DC via two-mode squeezed-vacuum state), [Bose-Plenio-Vedral 00] (mixed state DC and its relation to entanglement measures), [Fang-Zhu-Feng-Mao-Du 00] (experimental implementation of DC using nuclear magnetic resonance), [Braunstein-Kimble 00] (DC for continuous variables), [Ban 00 b, c] (DC in a noisy quantum channel), [Gorbachev-Zhiliba-Trubilko-Yakovleva 00] (teleportation of entangled states and DC using a multiparticle quantum channel), [Hao-Li-Guo 00] (probabilistic DC and teleportation), [Werner 01 a] (teleportation and DC schemes), [Hiroshima 01] (optimal DC with mixed state entanglement), [Bowen 01 a] (classical capacity of DC), [Hao-Li-Guo 01] (DC using GHZ), [Cereceda 01 b] (DC using three qubits), [Bowen 01 b], [Li-Pan-Jing-(+3) 01] (DC exploiting bright EPR beam), [Liu-Long-Tong-Li 02] (DC between multi-parties), [Grudka-Wójcik 02 a] (symmetric DC between multiparties), [Lee-Ahn-Hwang 02], [Ralph-Huntington 02] (unconditional continuous-variable DC).

I.  Remote state preparation and measurement

(In remote state preparation Alice knows the state which is to be remotely prepared in Bob's site without sending him the qubit or the complete classical description of it. Using one bit and one ebit Alice can remotely prepare a qubit (from an special ensemble) of her choice at Bob's site. In remote state measurement Alice asks Bob to simulate any single particle measurement statistics on an arbitrary qubit [Bennett-DiVincenzo-Smolin-(+2) 01], [Pati 01 c, 02], [Srikanth 01 c], [Zeng-Zhang 02], [Berry-Sanders 03 a] (optimal RSP), [Agrawal-Parashar-Pati 03] (RSP for multiparties), [Bennett-Hayden-Leung-(+2) 02] (general method of remote state preparation for arbitrary states of many qubits, at a cost of 1 bit of classical communication and 1 bit of entanglement per qubit sent), [Shi-Tomita 02 c] (RSP of an entangled state), [Abeyesinghe-Hayden 03] (generalized RSP).

J.  Classical information capacity of quantum channels

(A quantum channel is defined by the action of sending one of n possible messages, with different a priori probabilities, to a receiver in the form of one of n distinct density operators. The receiver can perform any generalized measurement in an attempt to discern which message was sent.) [Gordon 64], [Levitin 69, 87, 93], [Holevo 73 a, b, 79, 97 a, b, 98 a, b, c], [Yuen-Ozawa 93], [Hall-O'Rourke 93], [Jozsa-Robb-Wootters 94] (lower bound for accessible information), [Fuchs-Caves 94] (simplification of the Holevo upper bound of the maximum information extractable in a quantum channel, and upper and lower bounds for binary channels), [Hausladen-Schumacher-Westmoreland-Wootters 95], [Hausladen-Jozsa-Schumacher-(+2) 96], [Schumacher-Westmoreland-Wootters 96] (limitation on the amount of accessible information in a quantum channel), [Schumacher-Westmoreland 97].

K.  Quantum coding, quantum data compression

[Schumacher 95] (optimal compression of quantum information carried by ensembles of pure states), [Lo 95] (quantum coding theorem for mixed states), [Horodecki 98] (limits for compression of quantum information carried by ensembles of mixed states), [Horodecki-Horodecki-Horodecki 98 a] (optimal compression of quantum information for one-qubit source at incomplete data), [Barnum-Smolin-Terhal 97, 98], [Jozsa-Horodecki-Horodecki-Horodecki 98] (universal quantum information compression), [Horodecki 00] (toward optimal compression for mixed signal states), [Barnum 00].

L.  Reducing the communication complexity with quantum entanglement

[Yao 79], [Cleve-Buhrman 97] (substituting quantum entanglement for communication), [Cleve-Tapp 97], [Grover 97 a], [Buhrman-Cleve-van Dam 97] (two-party communication complexity problem: Alice receives a string x=(x0, x1) and Bob a string y=(y0, y1). Each of the strings is a combination of two bit values: x0,y0 Î {0,1} and x1, y1 Î {-1,1}. Their common goal is to compute the function f (x,y) = x1 y1 (-1)x0 y0, with as high a probability as possible, while exchanging altogether only 2 bits of information. This can be done with a probability of success of 0.85 if the two parties share two qubits in a maximally entangled state, whereas with shared random variables but without entanglement, this probability cannot exceed 0.75. Therefore, in a classical protocol 3 bits of information are necessary to compute f with a probability of at least 0.85, whereas with the use of entanglement 2 bits of information are sufficient to compute f with the same probability), [Buhrman-van Dam-Høyer-Tapp 99] (reducing the communication complexity in the "guess my number" game using a GHZ state, see also [Steane-van Dam 00] and [Gruska-Imai 01] (p. 28)), [Raz 99] (exponential separation of quantum and classical communication complexity), [Galvão 00] (experimental requirements for quantum communication complexity protocols), [Lo 00 a] (classical-communication cost in distributed quantum-information processing: A generalization of quantum-communication complexity), [Klauck 00 b, 01 a], [Brassard 01] (survey), [Høyer-de Wolf 01] (improved quantum communication complexity bounds for disjointness and equality), [Xue-Li-Zhang-Guo 01] (three-party quantum communication complexity via entangled tripartite pure states), [Xue-Huang-Zhang-(+2) 01] (reducing the communication complexity with quantum entanglement", [Brukner-Żukowski-Zeilinger 02] (quantum communication complexity protocol with two entangled qutrits), [Galvão 02] (feasible quantum communication complexity protocol), [Massar 02] (closing the detection loophole and communication complexity), [Brukner-Żukowski-Pan-Zeilinger 02] (violation of Bell's inequality: Criterion for quantum communication complexity advantage).

M.  Quantum games and quantum strategies

[Meyer 99 a] (comment: [van Enk 00]; reply: [Meyer 00 a]), [Eisert-Wilkens-Lewenstein 99] (comment: [Benjamin-Hayden 01 b]), [Marinatto-Weber 00 a] (comment: [Benjamin 00 c]; reply: [Marinatto-Weber 00 c]), [Eisert-Wilkens 00 b], [Li-Zhang-Huang-Guo 00] (quantum Monty Hall problem), [Du-Xu-Li-(+2) 00] (Nash equilibrium in QG), [Du-Li-Xu-(+3) 00] (multi-player and multi-choice QG), [Du-Xu-Li-(+3) 00] (quantum strategy without entanglement), [Wang-Kwek-Oh 00] (quantum roulette: An extended quantum strategy), [Johnson 01] (QG with a corrupted source), [Benjamin-Hayden 01 a], [Du-Xu-Li-(+2) 01] (entanglement playing a dominating role in QG), [Du-Li-Xu-(+3) 01 a] (quantum battle of the sexes), [Kay-Johnson-Benjamin 01] (evolutionary QG), [Parrondo 01], [Iqbal-Toor 01 a, b, c, 02 a, b, c, d, e], [Du-Li-Xu-(+4) 01] (experimental realization of QG on a quantum computer), [Piotrowski-Sladkowski 01] (bargaining QG), [Nawaz-Toor 01 a] (strategies in quantum Hawk-Dove game), [Klarreich 01] (Nature), [Nawaz-Toor 01 b] (worst-case payoffs in quantum battle of sexes game), [Du-Li-Xu-(+3) 01 b], [Flitney-Ng-Abbott 02] (quantum Parrondo's games), [D'Ariano-Gill-Keyl-(+3) 02] (quantum Monty Hall problem), [Chen-Kwek-Oh 02] (noisy QG), [Flitney-Abbott 02] (quantum version of the Monty Hall problem), [Han-Zhang-Guo 02 a] (GHZ and W states in quantum three-person prisoner's dilemma), [Protopopescu-Barhen 02] (solving continuous global optimization problems using quantum algorithms), [van Enk-Pike 02] (classical rules in quantum games), [Ma-Long-Deng-(+2) 02] (cooperative three- and four-player quantum games), [Meyer 02], [Du-Li-Xu-(+3) 02] (entanglement enhanced multiplayer quantum games); [Li-Du-Massar 02] (continuous-variable quantum games), [Lee-Johnson 02 b] (review), [Guinea-Martín Delgado 03] (quantum chinos game), [Chen-Hogg-Beausoleil 03] (quantum n-player public goods game), [Du-Xu-Li-(+2) 02] (playing prisoner's dilemma with quantum rules), [Gravier-Jorrand-Mhalla-Payan 03], [Ozdemir-Shimamura-Morikoshi-Imoto 02] (samaritan's dilemma), [Shimamura-Ozdemir-Morikoshi-Imoto 03].

N.  Quantum clock synchronization

[Chuang 00], [Jozsa-Abrams-Dowling-Williams 00], [Burt-Ekstrom-Swanson 00], [Genovese-Novero 00 c] (QCS based on entangled photon pairs transmission), [Shahriar 00], [Preskill 00 b] (QCS and quantum error correction), [Hwang-Ahn-Hwang-Han 00] (entangled quantum clocks for measuring proper-time difference), [Giovannetti-Lloyd-Maccone 01 a, 02 a], [Harrelson-Kerenidis 01], [Giovannetti-Lloyd-Maccone-Wong 01], [Janzing-Beth 01 c] (quasi-order of clocks and synchronism and quantum bounds for copying timing information), [Yurtsever-Dowling 02], [Giovannetti-Lloyd-Maccone-Wong 02], [Giovannetti-Lloyd-Maccone-Shahriar 02] (limits to QCS induced by completely dephasing communication channels), [Krco-Paul 02] (a multi-party protocol).