The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states
暂无分享,去创建一个
[1] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[2] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[3] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[4] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[5] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[6] Qiaoyan Wen,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .
[7] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[8] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[9] Jian Wang,et al. Publisher's Note: Measurement-Device-Independent Quantum Key Distribution over 200 km [Phys. Rev. Lett. 113, 190501 (2014)] , 2015 .
[10] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[11] G. Guo,et al. Experimental demonstration of quantum key distribution without monitoring of the signal disturbance , 2015, 1505.07884.
[12] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[13] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[14] A. Karlsson,et al. Improved practical decoy state method in quantum key distribution with parametric down-conversion source , 2007 .
[15] H. Lo,et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.
[16] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[17] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[18] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[19] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[20] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[21] Qin Wang,et al. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.
[22] Xiang‐Bin Wang,et al. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100% , 2014 .
[23] Zheng-Fu Han,et al. Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source , 2014, Quantum Information Processing.
[24] Dong Liu,et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.
[25] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[26] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[27] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[28] Qin Wang,et al. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources , 2014, Scientific Reports.
[29] P. A. Hiskett,et al. Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.
[30] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[31] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[32] Shuang Wang,et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring , 2015, Nature Photonics.