Preliminary Security Analysis of the Multi-stage Protocol
暂无分享,去创建一个
[1] Pramode K. Verma,et al. Quantum secure communication using a multi-photon tolerant protocol , 2015, Photonics West - Optoelectronic Materials and Devices.
[2] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[3] Renato Renner,et al. Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses , 2006, quant-ph/0610151.
[4] Pramode K. Verma,et al. Multi-stage quantum secure communication using polarization hopping , 2015, Secur. Commun. Networks.
[5] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[6] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[7] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[8] C. Helstrom. Quantum detection and estimation theory , 1969 .
[9] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[10] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[11] Ulrike Herzog. Minimum-error discrimination between a pure and a mixed two-qubit state , 2004 .
[12] János A. Bergou,et al. Discrimination of quantum states , 2010 .
[13] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[14] C. Fuchs. Distinguishability and Accessible Information in Quantum Theory , 1996, quant-ph/9601020.