Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?
暂无分享,去创建一个
[1] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[2] Hoi-Kwong Lo,et al. Experimental quantum key distribution with source flaws , 2015 .
[3] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[4] James F. Dynes,et al. A quantum access network , 2013, Nature.
[5] A R Dixon,et al. Efficient decoy-state quantum key distribution with quantified security. , 2013, Optics express.
[6] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[7] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] S. N. Molotkov,et al. Decoy state method for quantum cryptography based on phase coding into faint laser pulses , 2017 .
[9] F. Khodabakhshi,et al. Applying Simulated Annealing For Optimal Operation of Multi-Reservoir Systems , 2009 .
[10] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[11] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[12] Александр Семенович Холево,et al. Квантовые теоремы кодирования@@@Quantum coding theorems , 1998 .
[13] Xiongfeng Ma,et al. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems , 2016, 1611.02524.
[14] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .