Upper bounds on the performance of differential-phase-shift quantum key distribution
暂无分享,去创建一个
[1] Toyohiro Tsurumaru. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol , 2007 .
[2] Hiroki Takesue,et al. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors. , 2006, Optics express.
[3] Yoshihisa Yamamoto,et al. Differential phase shift quantum key distribution. , 2002 .
[4] Miloslav Dusek,et al. Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .
[5] G. David Forney,et al. Geometrically uniform codes , 1991, IEEE Trans. Inf. Theory.
[6] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[7] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[8] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[9] M. Fejer,et al. Differential phase shift quantum key distribution experiment over 105 km fibre , 2005, quant-ph/0507110.
[10] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[11] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[12] A. Shimony,et al. Optimal distinction between two non-orthogonal quantum states , 1995 .
[13] Yoshihisa Yamamoto,et al. Differential-phase-shift quantum key distribution using coherent light , 2003 .
[14] M. Ruskai. Qubit Entanglement Breaking Channels , 2003, quant-ph/0302032.
[15] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[16] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[17] Nicolas Gisin,et al. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography , 2008 .
[18] I. D. Ivanović. How to differentiate between non-orthogonal states , 1987 .
[19] Momtchil Peev,et al. A Framework for Practical Quantum Cryptography , 2008 .
[20] Norbert Lütkenhaus,et al. Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.
[21] M. Ruskai,et al. Entanglement Breaking Channels , 2003, quant-ph/0302031.
[22] Yonina C. Eldar. A semidefinite programming approach to optimal unambiguous discrimination of quantumstates , 2003, IEEE Trans. Inf. Theory.
[23] D. Dieks. Overlap and distinguishability of quantum states , 1988 .
[24] Marcos Curty,et al. Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks , 2008, 0803.1473.
[25] S. Barnett,et al. Optimum unambiguous discrimination between linearly independent symmetric states , 1998, quant-ph/9807023.
[26] M. Koashi,et al. Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse , 2006, quant-ph/0607082.
[27] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[28] D. Vernon. Inform , 1995, Encyclopedia of the UN Sustainable Development Goals.
[29] M. Koashi. Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. , 2004, Physical review letters.
[30] Yonina C. Eldar,et al. Designing optimal quantum detectors via semidefinite programming , 2003, IEEE Trans. Inf. Theory.
[31] Hoi-Kwong Lo,et al. Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states , 2007, Quantum Inf. Comput..
[32] Yoshihisa Yamamoto,et al. Security of differential-phase-shift quantum key distribution against individual attacks , 2005, quant-ph/0508112.