Secure communication via quantum illumination
暂无分享,去创建一个
[1] R. Gallager. Information Theory and Reliable Communication , 1968 .
[2] Jeffrey H. Shapiro,et al. Defeating Active Eavesdropping with Quantum Illumination , 2009, 0904.2490.
[3] H. Yuen,et al. Secure communication using mesoscopic coherent states. , 2002, Physical review letters.
[4] Patricia Bower,et al. High speed converters and DSP for 100G and beyond , 2011 .
[5] F. Marsili,et al. Detecting single infrared photons with 93% system efficiency , 2012, 1209.5774.
[6] Seth Lloyd,et al. Quantum enigma machines and the locking capacity of a quantum channel , 2013, ArXiv.
[7] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[8] C. C. Goodyear,et al. Radiation and Noise in Quantum Electronics , 1965 .
[9] E. Bagan,et al. Quantum Chernoff bound as a measure of distinguishability between density matrices: Application to qubit and Gaussian states , 2007, 0708.2343.
[10] D. Rosenberg,et al. High-speed and high-efficiency superconducting nanowire single photon detector array. , 2013, Optics express.
[11] S. Lloyd,et al. Quantum illumination with Gaussian states. , 2008, Physical review letters.
[12] J. Shapiro,et al. Photon Information Efficient Communication Through Atmospheric Turbulence–Part I: Channel Model and Propagation Statistics , 2014, Journal of Lightwave Technology.
[13] Seth Lloyd,et al. Quantum enigma machines , 2013, 1307.0380.
[14] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[15] Jeffrey H. Shapiro,et al. Photon Information Efficient Communication Through Atmospheric Turbulence—Part II: Bounds on Ergodic Classical and Private Capacities , 2014, Journal of Lightwave Technology.
[16] Saikat Guha,et al. Gaussian-state quantum-illumination receivers for target detection , 2009, 0911.0950.
[17] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] S. Lloyd. Enhanced Sensitivity of Photodetection via Quantum Illumination , 2008, Science.
[20] Ranjith Nair,et al. Discriminating quantum-optical beam-splitter channels with number-diagonal signal states: Applications to quantum reading and target detection , 2011, 1105.4063.
[21] K. Audenaert,et al. Discriminating States: the quantum Chernoff bound. , 2006, Physical review letters.
[22] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[23] Jeffrey H. Shapiro,et al. Defeating Active Eavesdropping with Quantum Illumination , 2011 .
[24] Zheshen Zhang,et al. Entanglement's benefit survives an entanglement-breaking channel. , 2013, Physical review letters.
[25] Jeffrey H. Shapiro,et al. Near-field turbulence effects on quantum-key distribution , 2003 .
[26] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[27] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[28] Jeffrey H. Shapiro. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution , 2011 .
[29] Seth Lloyd,et al. Computable bounds for the discrimination of Gaussian states , 2008, 0806.1625.