The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources
暂无分享,去创建一个
Qin Wang | Guang-Can Guo | Xingyu Zhou | Chun-Hui Zhang | G. Guo | Qin Wang | Chun-Hui Zhang | Xingyu Zhou
[1] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[2] S. Mori,et al. On the distribution of 1550-nm photon pairs efficiently generated using a periodically poled lithium niobate waveguide , 2005, quant-ph/0509186.
[3] A. Karlsson,et al. Performance enhancement of a decoy-state quantum key distribution using a conditionally prepared down-conversion source in the Poisson distribution , 2007 .
[4] Tao Zhang,et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.
[5] Hoi-Kwong Lo,et al. Long distance measurement-device-independent quantum key distribution with entangled photon sources , 2013, 1306.5814.
[6] Xiang‐Bin Wang,et al. Three-intensity decoy state method for device independent quantum key distribution , 2013, 1309.5886.
[7] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[8] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[9] Qin Wang,et al. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.
[10] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[11] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[12] Shanghong Zhao,et al. Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency , 2014, Quantum Inf. Process..
[13] Feihu Xu,et al. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.
[14] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[15] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[16] Feng Zhu,et al. A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light , 2015, Quantum Inf. Process..
[17] Wei Chen,et al. Decoy-state measurement-device-independent quantum key distribution with mismatched-basis statistics , 2015 .
[18] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[19] A. Karlsson,et al. Improved practical decoy state method in quantum key distribution with parametric down-conversion source , 2007 .
[20] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[21] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[22] H. Lo,et al. Practical decoy state for quantum key distribution (15 pages) , 2005 .
[23] T. Kobayashi,et al. Quantum key distribution with a heralded single photon source , 2007, International Quantum Electronics Conference, 2005..
[24] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[25] Qin Wang,et al. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources , 2014, Scientific Reports.
[26] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[27] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[28] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[29] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[30] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[31] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[32] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[33] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.