A Voltage Pulse Generator for Measurement-Device-Independent Quantum Key Distribution
暂无分享,去创建一个
Hao Liang | Nan Zhou | Sijie Zhang | Fanshui Deng | Nan Zhou | Sijie Zhang | F. Deng | Hao Liang | H. Liang
[1] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[2] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[3] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[4] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[5] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[6] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[7] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[8] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[9] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[10] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[11] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[12] Wei Chen,et al. Effect of intensity modulator extinction on practical quantum key distribution system , 2012, 1206.6591.
[13] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[14] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[15] H. Weinfurter,et al. Multiphoton entanglement and interferometry , 2003, 0805.2853.
[16] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[17] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[18] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[19] F. Marsili,et al. Detecting single infrared photons with 93% system efficiency , 2012, 1209.5774.
[20] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[21] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[22] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[23] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[24] J. Skaar,et al. Laser damage helps the eavesdropper in quantum cryptography. , 2013, Physical review letters.
[25] Qiang Zhou,et al. Measurement-device-independent quantum key distribution: from idea towards application , 2015, 1501.07307.
[26] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[27] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.