Ensuring Quality of Shared Keys Through Quantum Key Distribution for Practical Application
暂无分享,去创建一个
A. Tajima | W. Maeda | A. Tanaka | S. Takahashi | A. Tomita | A. Tomita | A. Tanaka | Seigo Takahashi | W. Maeda | A. Tajima | S. Takahashi | Wakako Maeda | A. Tajima | Akihisa Tomita
[1] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[2] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[3] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[4] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[5] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[6] Masahito Hayashi,et al. Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics , 2007, 0705.3081.
[7] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[8] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[9] Richard J. Hughes,et al. Practical long-distance quantum key distribution system using decoy levels , 2008, 0806.3085.
[10] A. Tajima,et al. Practical Quantum Cryptosystem for Metro Area Applications , 2007, IEEE Journal of Selected Topics in Quantum Electronics.
[11] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[12] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[13] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[14] Xuemin Chen,et al. Error-Control Coding for Data Networks , 1999 .
[15] N. Imoto,et al. Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.
[16] B. Baek,et al. Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization. , 2008, Optics express.
[17] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[18] A. Tajima,et al. Fortnight quantum key generation field trial using QBER monitoring , 2005, 2005 IEEE LEOS Annual Meeting Conference Proceedings.
[19] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[20] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[21] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[22] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[23] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[24] J. Dynes,et al. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.