Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.
暂无分享,去创建一个
P. Sekatski | N. Sangouard | M. Ho | E.Y.-Z. Tan | R. Renner | J.-D. Bancal | R. Renner | J. Bancal | N. Sangouard | P. Sekatski | M. Ho | E. Y. Tan
[1] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[2] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[3] Tsuyoshi Murata,et al. {m , 1934, ACML.
[4] Jędrzej Kaniewski,et al. Analytic and Nearly Optimal Self-Testing Bounds for the Clauser-Horne-Shimony-Holt and Mermin Inequalities. , 2016, Physical review letters.
[5] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[6] R. Renner,et al. An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.
[7] Yang Liu,et al. Device-independent quantum random-number generation , 2018, Nature.
[8] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[9] Umesh Vazirani,et al. Fully device-independent quantum key distribution. , 2012, 1210.1810.
[10] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[11] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[12] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[13] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[14] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[15] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[16] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[17] M. Horodecki,et al. Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .
[18] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[19] A. Zeilinger,et al. Bell violation using entangled photons without the fair-sampling assumption , 2012, Nature.
[20] N. Gisin,et al. Challenging preconceptions about Bell tests with photon pairs , 2014, 1405.1939.
[21] Pavel Sekatski,et al. What is the minimum CHSH score certifying that a state resembles the singlet? , 2020, Quantum.
[22] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[23] E. Knill,et al. Theory of quantum computation , 2000, quant-ph/0010057.
[24] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[25] Le Phuc Thinh,et al. Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.
[26] Xiongfeng Ma,et al. Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD , 2011, Quantum Inf. Comput..
[27] B Kraus,et al. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.
[28] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[29] Aaron J. Miller,et al. Detection-loophole-free test of quantum nonlocality, and applications. , 2013, Physical review letters.
[30] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[32] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[33] Graeme Smith,et al. Noisy processing and distillation of private quantum States. , 2007, Physical review letters.
[34] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[35] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.
[36] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[37] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[38] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[39] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[40] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.