Clifford group restricted eavesdroppers in quantum key distribution
暂无分享,去创建一个
[1] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[2] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[3] Michael A. Nielsen,et al. Quantum Computation and Quantum Information Theory , 2000 .
[4] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.
[5] Jie Lin,et al. Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution , 2019 .
[6] Norbert Lutkenhaus,et al. Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal Cloning , 2011, 1112.3396.
[7] William. IEEE TRANSACTIONS ON INFORMATION THEORY VOL XX NO Y MONTH Signal Propagation and Noisy Circuits , 2019 .
[8] David Jao,et al. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2014, J. Math. Cryptol..
[9] John M. Martinis,et al. Logic gates at the surface code threshold: Superconducting qubits poised for fault-tolerant quantum computing , 2014 .
[10] D. Trotter,et al. Metropolitan quantum key distribution with silicon photonics , 2017, 1708.00434.
[11] M Saffman,et al. Randomized benchmarking of single-qubit gates in a 2D array of neutral-atom qubits. , 2015, Physical review letters.
[12] Stephen P. Boyd,et al. Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.
[13] Norbert Lütkenhaus,et al. Optimal architectures for long distance quantum communication , 2015, Scientific Reports.
[14] Patrick J. Coles. Unification of different views of decoherence and discord , 2011, 1110.1664.
[15] C. Simon,et al. Rate-loss analysis of an efficient quantum repeater architecture , 2014, 1404.7183.
[16] Christoph Simon,et al. Practical quantum repeaters with parametric down-conversion sources , 2015, 1505.03470.
[17] Liang Jiang,et al. Efficient long distance quantum communication , 2015, 1509.08435.
[18] Joe Buhler. Proceedings of the Third International Symposium on Algorithmic Number Theory , 1998 .
[19] Pablo A. Parrilo,et al. Semidefinite Approximations of the Matrix Logarithm , 2017, Foundations of Computational Mathematics.
[20] Ivan B. Djordjevic,et al. Secret key distillation across a quantum wiretap channel under restricted eavesdropping , 2019, Physical Review Applied.
[21] S. Guha,et al. Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.
[22] Dave Cliff,et al. In/Proceedings of the 15th IEEE International Conference on the Engineering of Complex Computer Systems/ (ICECCS 2010), Oxford , 2010 .
[23] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[24] Nathan Walk,et al. Optimal realistic attacks in continuous-variable quantum key distribution , 2018, Physical Review A.
[25] Nathan Killoran,et al. Quantum benchmarking with realistic states of light , 2012 .
[26] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[27] L. Banchi,et al. Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.
[28] E Knill,et al. Randomized benchmarking of multiqubit gates. , 2012, Physical review letters.
[29] R. Barends,et al. Superconducting quantum circuits at the surface code threshold for fault tolerance , 2014, Nature.
[30] L. C. G. Govia,et al. Bootstrapping quantum process tomography via a perturbative ansatz , 2019, Nature Communications.
[31] Patrick J. Coles,et al. Reliable numerical key rates for quantum key distribution , 2017, Quantum.
[32] Norbert Lutkenhaus,et al. Probing the Quantumness of Channels with Mixed States , 2009, 0907.0699.
[33] R. Laflamme,et al. Randomized benchmarking of single- and multi-qubit control in liquid-state NMR quantum information processing , 2008, 0808.3973.
[34] Jay M. Gambetta,et al. Process verification of two-qubit quantum gates by randomized benchmarking , 2012, 1210.7011.
[35] Patrick J. Coles,et al. Numerical approach for unstructured quantum key distribution , 2015, Nature Communications.
[36] Rob Thew,et al. Provably secure and practical quantum key distribution over 307 km of optical fibre , 2014, Nature Photonics.
[37] M. Mariantoni,et al. Surface codes: Towards practical large-scale quantum computation , 2012, 1208.0928.
[38] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[39] Norbert Lütkenhaus,et al. Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.
[40] Tanja Lange,et al. Post-quantum cryptography , 2008, Nature.
[41] Nicolas Gisin,et al. Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.
[42] John Preskill,et al. Quantum Computing in the NISQ era and beyond , 2018, Quantum.