Architectural considerations in hybrid quantum-classical networks (Invited Paper)
暂无分享,去创建一个
Mohsen Razavi | Nicolo Lo Piparo | Christiana Panayi | David Edward Bruschi | David E. Bruschi | M. Razavi | N. L. Piparo | C. Panayi
[1] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[2] Richard J. Hughes,et al. Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments , 2009 .
[3] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[4] Jeffrey H. Shapiro,et al. Nonadiabatic approach to entanglement distribution over long distances , 2007 .
[5] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[6] G. Weihs,et al. Coherence measures for heralded single-photon sources , 2008, 0807.1725.
[7] Tao Zhang,et al. Field Experiment on a “Star Type” Metropolitan Quantum Key Distribution Network , 2009, IEEE Photonics Technology Letters.
[8] A. R. Dixon,et al. Ultrashort dead time of photon-counting InGaAs avalanche photodiodes , 2009, 0905.2931.
[9] Jeffrey H. Shapiro,et al. Long-distance quantum communication with neutral atoms , 2005, SPIE International Symposium on Fluctuations and Noise.
[10] N. Lutkenhaus,et al. Quantum repeaters with imperfect memories: Cost and scalability , 2008, 0810.5334.
[11] E. Diamanti,et al. Topological optimization of quantum key distribution networks , 2009, 0903.0839.
[12] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[13] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[14] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[15] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[16] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[17] P. Kumavor,et al. Comparison of four multi-user quantum key distribution schemes over passive optical networks , 2004, Journal of Lightwave Technology.
[18] D.Z. Chen,et al. In-band quantum key distribution (QKD) on fiber populated by high-speed classical data channels , 2006, 2006 Optical Fiber Communication Conference and the National Fiber Optic Engineers Conference.
[19] Tao Zhang,et al. Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.
[20] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[21] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[22] James F. Dynes,et al. Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .
[23] Richard J. Hughes,et al. Optical networking for quantum key distribution and quantum communications , 2009 .
[24] N. Gisin,et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.
[25] A. W. Sharpe,et al. Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.
[26] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[27] Paul D. Townsend,et al. Quantum information to the home , 2011, 2011 37th European Conference and Exhibition on Optical Communication.
[28] P. Villoresi,et al. Feasibility of satellite quantum key distribution , 2009, 0903.2160.
[29] Mohsen Razavi,et al. Quantum key distribution over probabilistic quantum repeaters , 2010 .
[30] Wolfgang Dür,et al. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .
[31] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[32] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[33] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[34] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[35] Wei Chen,et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.
[36] Mohsen Razavi,et al. Multiple-Access Quantum Key Distribution Networks , 2011, IEEE Transactions on Communications.
[37] M. Razavi,et al. Long-distance quantum key distribution with imperfect devices , 2012, 1210.8042.
[38] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[39] E. Diamanti,et al. Experimental demonstration of continuous-variable quantum key distribution over 80 km of standard telecom fiber , 2013, CLEO: 2013.
[40] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[41] Christoph Simon,et al. Long-Distance Entanglement Distribution with Single-Photon Sources , 2007, 0706.1924.
[42] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[43] G. Weihs,et al. Characterizing heralded single-photon sources with imperfect measurement devices , 2008, 0812.2445.
[44] Gilles Brassard,et al. Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.