Architectural Considerations in Hybrid Quantum-Classical Networks
暂无分享,去创建一个
Mohsen Razavi | Christiana Panayi | David Edward Bruschi | N Lo Piparo | M. Razavi | N. L. Piparo | C. Panayi
[1] Tao Zhang,et al. Field Experiment on a “Star Type” Metropolitan Quantum Key Distribution Network , 2009, IEEE Photonics Technology Letters.
[2] P. Kumavor,et al. Comparison of four multi-user quantum key distribution schemes over passive optical networks , 2004, Journal of Lightwave Technology.
[3] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[4] Richard J. Hughes,et al. Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments , 2009 .
[5] D.Z. Chen,et al. In-band quantum key distribution (QKD) on fiber populated by high-speed classical data channels , 2006, 2006 Optical Fiber Communication Conference and the National Fiber Optic Engineers Conference.
[6] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[7] Gilles Brassard,et al. Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.
[8] Paul D. Townsend,et al. Quantum information to the home , 2011, 2011 37th European Conference and Exhibition on Optical Communication.
[9] P. Villoresi,et al. Feasibility of satellite quantum key distribution , 2009, 0903.2160.
[10] Richard J. Hughes,et al. Optical networking for quantum key distribution and quantum communications , 2009 .
[11] Mohsen Razavi,et al. Quantum key distribution over probabilistic quantum repeaters , 2010 .
[12] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[13] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[14] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[15] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[16] A. R. Dixon,et al. Ultrashort dead time of photon-counting InGaAs avalanche photodiodes , 2009, 0905.2931.
[17] M. Razavi,et al. Long-distance quantum key distribution with imperfect devices , 2012, 1210.8042.
[18] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[19] Jeffrey H. Shapiro,et al. Nonadiabatic approach to entanglement distribution over long distances , 2007 .
[20] Jeffrey H. Shapiro,et al. Long-distance quantum communication with neutral atoms , 2005, SPIE International Symposium on Fluctuations and Noise.
[21] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[22] Wei Chen,et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.
[23] Mohsen Razavi,et al. Multiple-Access Quantum Key Distribution Networks , 2011, IEEE Transactions on Communications.
[24] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[25] N. Gisin,et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.
[26] A. W. Sharpe,et al. Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.
[27] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[28] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[29] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[30] G. Weihs,et al. Coherence measures for heralded single-photon sources , 2008, 0807.1725.
[31] Wolfgang Dür,et al. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .
[32] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[33] N. Lutkenhaus,et al. Quantum repeaters with imperfect memories: Cost and scalability , 2008, 0810.5334.
[34] E. Diamanti,et al. Topological optimization of quantum key distribution networks , 2009, 0903.0839.
[35] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[36] E. Diamanti,et al. Experimental demonstration of continuous-variable quantum key distribution over 80 km of standard telecom fiber , 2013, CLEO: 2013.
[37] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[38] James F. Dynes,et al. Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .
[39] Tao Zhang,et al. Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.
[40] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[41] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[42] Christoph Simon,et al. Long-Distance Entanglement Distribution with Single-Photon Sources , 2007, 0706.1924.
[43] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[44] G. Weihs,et al. Characterizing heralded single-photon sources with imperfect measurement devices , 2008, 0812.2445.