Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations
暂无分享,去创建一个
Chun Zhou | Wansu Bao | Xiangqun Fu | Wansu Bao | Xiangqun Fu | Chun Zhou
[1] Xiang-Bin Wang. A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .
[2] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[3] B Kraus,et al. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.
[4] Zheng-Fu Han,et al. Erratum: Decoy-state theory for the heralded single-photon source with intensity fluctuations [Phys. Rev. A 79, 062309 (2009)] , 2010 .
[5] Dong Liu,et al. Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .
[6] Multiphoton communication in lossy channels with photon-number entangled states , 2006, quant-ph/0612028.
[7] G. Guo,et al. Experimental Decoy Quantum Key Distribution Up To 130KM Fiber , 2007, 0704.2941.
[8] Takayoshi Kobayashi,et al. Decoy state quantum key distribution with a photon number resolved heralded single photon source , 2006 .
[9] M. Koashi. Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. , 2004, Physical review letters.
[10] Guihua Zeng,et al. Realization of error correction and reconciliation of continuous quantum key distribution in detail , 2009, Science in China Series F: Information Sciences.
[11] Agarwal,et al. Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.
[12] G. Guo,et al. Active phase compensation of quantum key distribution system , 2008 .
[13] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[14] V. Scarani,et al. Security of two quantum cryptography protocols using the same four qubit states (18 pages) , 2005, quant-ph/0505035.
[15] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[16] Wang Xiangbin. Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)] , 2005 .
[17] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[18] P. A. Hiskett,et al. Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.
[19] Jian-Wei Pan,et al. General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.
[20] Zheng-Fu Han,et al. Decoy-state theory for the heralded single-photon source with intensity fluctuations , 2009 .
[21] ChengZu Li. Real applications of quantum communications in China , 2009 .
[22] Jian-Wei Pan,et al. Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.
[23] F. Toscano,et al. Quantum metrology at the Heisenberg limit with ion trap motional compass states , 2006, quant-ph/0608082.
[24] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[25] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[26] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[27] Kai Chen,et al. Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.
[28] Guang-Can Guo,et al. A universal coherent source for quantum key distribution , 2009 .
[29] Peilin Hong,et al. Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network , 2009, Science in China Series F: Information Sciences.
[30] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[31] Zheng-Fu Han,et al. Decoy state quantum key distribution with modified coherent state , 2007, 0704.3833.
[32] H. Lo,et al. Performance of two quantum-key-distribution protocols , 2006 .
[33] Guo Guangcan,et al. Experimental Decoy State Quantum Key Distribution Over 120 km Fibre , 2008 .
[34] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.