Experimentally Verified Approach to Nonentanglement-Breaking Channel Certification.
暂无分享,去创建一个
Hao Li | Jian-Wei Pan | Hui Liu | L. You | Yingqiu Mao | Zhen Wang | Hao Liang | Jian Wang | Nai-Le Liu | Li Li | Kai Chen | Sijie Zhang | Weijun Zhang | Yi-Zheng Zhen | Mi Zou | Kai Chen | Q. Tang | Teng-Yun Chen | Teng-Yun Chen | Nai-Le Liu
[1] Wenguang,et al. Electron , 2020, Definitions.
[2] Massimiliano Proietti,et al. Measurement-Device-Independent Verification of Quantum Channels. , 2019, Physical review letters.
[3] Leandro Aolita,et al. Distributed sampling, quantum communication witnesses, and measurement incompatibility , 2019, Physical Review A.
[4] Nicolai Friis,et al. Entanglement certification from theory to experiment , 2018, Nature Reviews Physics.
[5] Hoi-Kwong Lo,et al. Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks , 2018, Physical Review X.
[6] Antonio Acín,et al. Device-Independent Entanglement Certification of All Entangled States. , 2018, Physical review letters.
[7] Yeong-Cherng Liang,et al. A resource theory of quantum memories and their faithful verification with minimal assumptions , 2017, 1710.04710.
[8] Qiang Zhang,et al. Integrating quantum key distribution with classical communications in backbone fiber network. , 2017, Optics express.
[9] Paul Skrzypczyk,et al. Measurement-device-independent entanglement and randomness estimation in quantum networks , 2017, 1702.04752.
[10] L. Comandar,et al. Long-distance quantum key distribution secure against coherent attacks , 2017, 1701.07252.
[11] Wei Zhang,et al. Quantum teleportation with independent sources and prior entanglement distribution over a network , 2016, Nature Photonics.
[12] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[13] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[14] S. Wehner,et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.
[15] H Zbinden,et al. Resource-Efficient Measurement-Device-Independent Entanglement Witness. , 2015, Physical review letters.
[16] Mohamed Bourennane,et al. Experimental Measurement-Device-Independent Entanglement Detection , 2015, Scientific Reports.
[17] Ping Xu,et al. Implementation of a measurement-device-independent entanglement witness. , 2014, Physical review letters.
[18] C. Schwemmer,et al. Systematic errors in current quantum state tomography tools. , 2013, Physical review letters.
[19] Feihu Xu,et al. Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.
[20] Nicolas Gisin,et al. Measurement-device-independent entanglement witnesses for all entangled quantum states. , 2012, Physical review letters.
[21] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[22] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[23] Francesco Buscemi,et al. All entangled quantum states are nonlocal. , 2011, Physical review letters.
[24] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[25] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[26] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[27] Francesco Buscemi,et al. Comparison of Quantum Statistical Models: Equivalent Conditions for Sufficiency , 2010, Communications in Mathematical Physics.
[28] G. Tóth,et al. Entanglement detection , 2008, 0811.2803.
[29] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[30] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[31] H. Lo,et al. Practical decoy state for quantum key distribution (15 pages) , 2005, quant-ph/0503005.
[32] V. Scarani,et al. Entanglement and non-locality are different resources , 2004, quant-ph/0412109.
[33] S. Lloyd,et al. Quantum-Enhanced Measurements: Beating the Standard Quantum Limit , 2004, Science.
[34] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[35] Xiang‐Bin Wang,et al. Beating the photon-number-splitting attack in practical quantum cryptography. , 2004, Physical review letters.
[36] T. Ralph,et al. Quantum process tomography of a controlled-NOT gate. , 2004, Physical review letters.
[37] M. Lewenstein,et al. Entanglement as a precondition for secure quantum key distribution. , 2003, Physical review letters.
[38] Shengjun Wu,et al. What is quantum entanglement , 2003 .
[39] Andrew G. White,et al. Ancilla-assisted quantum process tomography. , 2003, Physical review letters.
[40] W. Hwang. Quantum key distribution with high loss: toward global secure communication. , 2002, Physical review letters.
[41] M. Ruskai,et al. Entanglement Breaking Channels , 2003, quant-ph/0302031.
[42] R. Jozsa,et al. On the role of entanglement in quantum-computational speed-up , 2002, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[43] G M D'Ariano,et al. Quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation. , 2001, Physical review letters.
[44] G. Brassard,et al. Security aspects of practical quantum cryptography , 1999, Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504).
[45] P. Townsend. Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing , 1997 .
[46] P. Zoller,et al. Complete Characterization of a Quantum Process: The Two-Bit Quantum Gate , 1996, quant-ph/9611013.
[47] Subhayan Roy Moulick,et al. Quantum Information Theory , 2013 .