Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling
暂无分享,去创建一个
[1] H. Chernoff. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .
[2] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[3] Mario Berta,et al. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .
[4] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[5] Kyo Inoue,et al. Differential-quadrature-phase-shift quantum key distribution , 2009 .
[6] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[7] Akihiro Mizutani,et al. Finite-key security analysis of quantum key distribution with imperfect light sources , 2015, 1504.08151.
[8] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[9] O. William. Journal Of The American Statistical Association V-28 , 1932 .
[10] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[11] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[12] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[13] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[14] Masato Koashi,et al. Security of the differential-quadrature-phase-shift quantum key distribution , 2016 .
[15] J. Ahrens. A Comparison of Hypergeometric Distributions with Corresponding Binomial Distributions , 1987 .
[16] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.
[17] Salil P. Vadhan,et al. Theory of Cryptography , 2016, Lecture Notes in Computer Science.
[18] Ericka Stricklin-Parker,et al. Ann , 2005 .
[19] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[20] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[21] Normand J. Beaudry,et al. Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.
[22] Patrick J. Coles,et al. Sifting attacks in finite-size quantum key distribution , 2015, 1506.07502.
[23] M. Hayashi,et al. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths , 2013, 1302.4139.
[24] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[25] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[26] James F. Dynes,et al. Security Bounds for Efficient Decoy-State Quantum Key Distribution , 2015, IEEE Journal of Selected Topics in Quantum Electronics.