Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices
暂无分享,去创建一个
Mu-Sheng Jiang | Shi-Hai Sun | Lin-Mei Liang | Chun-Yan Li | L. Liang | S. Sun | Mu-Sheng Jiang | Chun-Yan Li
[1] H. Chau. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .
[2] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[3] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[4] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[5] Cheng-Zhi Peng,et al. Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source , 2007 .
[6] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[7] Jian-Wei Pan,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.
[8] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[9] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[10] B Baek,et al. Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.
[11] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[12] Shi-Hai Sun,et al. Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution , 2011 .
[13] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[14] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[15] Shi-Hai Sun,et al. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution , 2012 .
[16] G. Guo,et al. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.
[17] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[18] Mu-Sheng Jiang,et al. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system , 2011, 1203.0739.
[19] Yi Zhao,et al. Experimental quantum key distribution with active phase randomization , 2006, quant-ph/0611059.
[20] Michael Jetter,et al. Electrically driven quantum dot single-photon source at 2 GHz excitation repetition rate with ultra-low emission time jitter , 2013 .
[21] Mu-Sheng Jiang,et al. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .
[23] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[24] Jian Wang,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.
[25] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[26] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[27] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[28] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[29] John Preskill,et al. Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..
[30] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[31] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[32] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[33] Jian-Wei Pan,et al. Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.
[34] Xiang-Bin Wang,et al. Decoy-state quantum key distribution with large random errors of light intensity , 2007 .
[35] Ryo Namiki,et al. Security of quantum cryptography using balanced homodyne detection , 2002, quant-ph/0205191.
[36] P. Bhattacharya,et al. An electrically driven quantum dot-in-nanowire visible single photon source operating up to 150 K , 2013 .
[37] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[38] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[39] N. Gisin,et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.
[40] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .
[41] S. Assefa,et al. Heralded single photons from a silicon nanophotonic chip , 2012, 2012 Conference on Lasers and Electro-Optics (CLEO).
[42] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[43] Bingjie Xu,et al. Experimental quantum-key distribution with an untrusted source. , 2008, Optics letters.
[44] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[45] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[46] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[47] R. Namiki,et al. Quantum cryptography using pulsed homodyne detection , 2000, quant-ph/0008037.
[48] H. Lo,et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.
[49] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[50] S. Braunstein,et al. Quantum Information with Continuous Variables , 2004, quant-ph/0410100.
[51] Feihu Xu,et al. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.
[52] Jian-Wei Pan,et al. General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.
[53] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[54] Nicolas Gisin,et al. Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.
[55] H. Lo,et al. Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.
[56] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[57] H. Weinfurter,et al. Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .
[58] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[59] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[60] N. Gisin,et al. “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.
[61] L. Liang,et al. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.
[62] Zheshen Zhang,et al. Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems. , 2009, Optics express.
[63] Chun-Yan Li,et al. Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.
[64] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[65] C. G. Peterson,et al. Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.
[66] Bingjie Xu,et al. Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system , 2010, 1002.0196.
[67] S. Montangero,et al. Room temperature Rydberg Single Photon Source , 2012, 1212.2811.
[68] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[69] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[70] Chun-Yan Li,et al. Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.
[71] Yi Zhao,et al. Quantum key distribution with an unknown and untrusted source , 2008, 0802.2725.
[72] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[73] E S Polzik,et al. High purity bright single photon source. , 2007, Optics express.
[74] Mu-Sheng Jiang,et al. Frequency shift attack on ‘plug-and-play’ quantum key distribution systems , 2014 .
[75] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[76] G. Long,et al. Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.
[77] Dong Liu,et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.
[78] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[79] Wang Chuan,et al. Quantum secure direct communication and deterministic secure quantum communication , 2007 .
[80] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[81] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.