Using Modeling and Simulation to Study Photon Number Splitting Attacks
暂无分享,去创建一个
Michael R. Grimaila | Logan O. Mailloux | Douglas D. Hodson | Gerald B. Baumgartner | Ryan D. L. Engle | Colin McLaughlin | G. Baumgartner | D. Hodson | M. Grimaila | L. Mailloux | C. McLaughlin | R. D. Engle
[1] Philippe Grangier,et al. Quantum non-demolition measurements in optics , 1998, Nature.
[2] J. M. Ettinger,et al. Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.
[3] Hoi-Kwong Lo,et al. A brief introduction of quantum cryptography for engineers , 2010, 1002.1237.
[4] Stephen M. Barnett,et al. Conditional beam-splitting attack on quantum key distribution , 2001 .
[5] Gerald Baumgartner,et al. Performance Evaluations of Quantum Key Distribution System Architectures , 2015, IEEE Security & Privacy.
[6] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[7] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[8] J. H. Müller,et al. Quantum memories , 2010, 1003.1107.
[9] Dong Liu,et al. Field and long-term demonstration of a wide area quantum key distribution network , 2014, Optics express.
[10] M. Williamson,et al. Eavesdropping on practical quantum cryptography , 2002, quant-ph/0211155.
[11] Matthews T. Reynolds. Test and Evaluation of Complex Systems , 1997 .
[12] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[13] Nicolas Gisin,et al. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .
[14] Chip Elliott,et al. Quantum Cryptography , 2004, IEEE Secur. Priv..
[15] B. Sanders,et al. Optical quantum memory , 2009, 1002.4659.
[16] Gerald Baumgartner,et al. Quantum key distribution: examination of the decoy state protocol , 2015, IEEE Communications Magazine.
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[18] W. Grice. Arbitrarily complete Bell-state measurement using only linear optical elements , 2011 .
[19] Michael R. Grimaila,et al. A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities , 2015, IEEE Access.
[20] Xiang-Bin Wang. A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .
[21] N. Imoto,et al. Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.
[22] R. Hadfield. Single-photon detectors for optical quantum information applications , 2009 .
[23] Michael R. Grimaila,et al. Modeling decoy state Quantum Key Distribution systems , 2015 .
[24] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[25] P. Knight,et al. Introductory quantum optics , 2004 .
[26] G. S. Vernam. Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..
[27] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[28] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[29] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[30] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[31] A R Dixon,et al. High speed prototype quantum key distribution system and long term field trial. , 2015, Optics express.
[32] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[33] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[34] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[35] J. Raimond,et al. Seeing a single photon without destroying it , 1999, Nature.
[36] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[37] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[38] Valerio Scarani,et al. The black paper of quantum cryptography: Real implementation problems , 2009, Theor. Comput. Sci..
[39] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[40] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[41] V. Scarani,et al. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography , 2004, quant-ph/0408122.