The black paper of quantum cryptography: Real implementation problems
暂无分享,去创建一个
[1] Robert A. Meyers,et al. Encyclopedia of Complexity and Systems Science , 2009 .
[2] Xiongfeng Ma,et al. Security proof of quantum key distribution with detection efficiency mismatch , 2008, Quantum Inf. Comput..
[3] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Nicolas Gisin,et al. Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.
[6] N. Gisin,et al. Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.
[7] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[8] N. Gisin,et al. Partial list of bipartite Bell inequalities with four binary settings , 2007, 0711.3362.
[9] Andrew G. Glen,et al. APPL , 2001 .
[10] H. Weinfurter,et al. The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? , 2001, quant-ph/0104103.
[11] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[12] M. Hayashi. Upper bounds of eavesdropper’s performances in finite-length code with the decoy method , 2007, quant-ph/0702250.
[13] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[14] Jan Bouda,et al. SECOQC White Paper on Quantum Key Distribution and Cryptography , 2007, ArXiv.
[15] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[16] Christian Kurtsiefer,et al. Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.
[17] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[18] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[19] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[20] D. Deutsch. Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[21] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[22] P R Tapster,et al. Quantum cryptography: A step towards global key distribution , 2002, Nature.
[23] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[24] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[25] Fibirova Jana,et al. Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .
[26] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[27] C. G. Peterson,et al. Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.
[28] T. Moroder,et al. Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.
[29] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[30] T. Moroder,et al. Testing quantum devices: Practical entanglement verification in bipartite optical systems , 2007, 0711.2709.
[31] Stefano Pironio,et al. Bell inequalities resistant to detector inefficiency , 2002 .
[32] Yi Zhao,et al. Quantum key distribution with an unknown and untrusted source , 2008, 0802.2725.
[33] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[34] M. Dušek,et al. Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.
[35] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[36] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[37] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[38] N. Gisin,et al. “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.
[39] S. Massar. Nonlocality, closing the detection loophole, and communication complexity , 2001, quant-ph/0109008.
[40] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[41] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[42] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[43] B Baek,et al. Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.
[44] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[45] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[46] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.
[47] K. Tamaki,et al. Security proof for quantum-key-distribution systems with threshold detectors , 2008, 0803.4226.
[48] T. V'ertesi,et al. Quantum bounds on Bell inequalities , 2008, 0810.1615.
[49] Normand J. Beaudry,et al. Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.
[50] N. Gisin,et al. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.
[51] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[52] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[53] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[54] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[55] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[56] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[57] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .