Active Beam Splitting Attack Applied to Differential Phase Shift Quantum Key Distribution Protocol
暂无分享,去创建一个
[1] A. S. Trushechkin,et al. Perturbative treatment of inter-site couplings in the local description of open quantum networks , 2015, 1509.05754.
[2] E. O. Kiktenko,et al. Quantum key distribution protocol with pseudorandom bases , 2017, ArXiv.
[3] A simple coherent attack and practical security of differential phase shift quantum cryptography , 2014 .
[4] Christiane P. Koch,et al. Training Schrödinger’s cat: quantum optimal control , 2015, 1508.00442.
[5] Miloslav Dusek,et al. Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .
[6] D. D’Alessandro. Introduction to Quantum Control and Dynamics , 2007 .
[7] S. Kozyrev,et al. Manipulation of states of a degenerate quantum system , 2016 .
[8] Hoi-Kwong Lo,et al. Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states , 2007, Quantum Inf. Comput..
[9] H. Rabitz,et al. CONTROL OF QUANTUM PHENOMENA , 2011 .
[10] Michael Priestley,et al. Proceedings of IEEE Professional Communication Society International Professional Communication Conference and Proceedings of the 18th Annual ACM International Conference on Computer Documentation: Technology & Teamwork, Cambridge, Massachusetts, USA, September 24-27, 2000 , 2000, SIGDOC.
[11] Ian J. Spalding,et al. Laser physics , 1977, Nature.
[12] G. Milburn,et al. Quantum Measurement and Control , 2009 .
[13] I. Volovich. Cauchy-Schwarz inequality-based criteria for the non-classicality of sub-Poisson and antibunched light , 2016 .
[14] E. O. Kiktenko,et al. Practical issues in decoy-state quantum key distribution based on the central limit theorem , 2017, ArXiv.
[15] Yoshihisa Yamamoto,et al. Differential phase shift quantum key distribution. , 2002 .
[16] Rob Thew,et al. Quantum Science and Technology—one year on , 2018 .
[17] On a beam splitter attack and soft filtering of coherent states in differential phase shift quantum cryptography , 2014 .
[18] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[19] Toshihiko Sasaki,et al. Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity , 2017 .
[20] Masato Koashi,et al. Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.
[21] Nicolas Gisin,et al. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography , 2008 .
[22] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[23] A. Trushechkin. Semiclassical evolution of quantum wave packets on the torus beyond the Ehrenfest time in terms of Husimi distributions , 2016, 1607.07572.
[24] A. K. Fedorov,et al. Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack , 2017 .
[25] Alexander Semenovich Holevo,et al. Quantum Systems, Channels, Information: A Mathematical Introduction , 2019 .