Experimental quantum-key distribution with an untrusted source.
暂无分享,去创建一个
Bingjie Xu | Xiongfeng Ma | Hao Jiang | Xiang Peng | Hong Guo | Xiongfeng Ma | Xiang Peng | Hong Guo | Bingjie Xu | Hao Jiang
[1] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[2] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[3] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[4] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[5] Jian-Wei Pan,et al. General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.
[6] Yi Zhao,et al. Quantum key distribution with an unknown and untrusted source , 2008, 0802.2725.
[7] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] Lee. External photodetection of cavity radiation. , 1993, Physical review. A, Atomic, molecular, and optical physics.
[9] Herzog,et al. Compensation of losses in photodetection and in quantum-state measurements. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[10] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .