Measurement-device-independent quantum key distribution with heralded pair coherent state
暂无分享,去创建一个
Xiang Wang | Chun Zhou | Yang Wang | Hong-Wei Li | Wan-Su Bao | Rui-Ke Chen | Wansu Bao | Xiang Wang | Hongwei Li | Chun Zhou | Yang Wang | Rui-ke Chen | Ruike Chen | Xiang Wang
[1] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[2] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[3] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[4] Guang-Can Guo,et al. A universal coherent source for quantum key distribution , 2009 .
[5] M. Nadeem,et al. Position-based quantum cryptography over untrusted networks , 2014, 1403.5925.
[6] Mu-Sheng Jiang,et al. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems , 2013 .
[7] Yong-Su Kim,et al. An experimental comparison of BB84 and SARG04 quantum key distribution protocols , 2014 .
[8] Chun-Yan Li,et al. Erratum: Practical decoy-state measurement-device-independent quantum key distribution [Phys. Rev. A 87, 052329 (2013)] , 2013 .
[9] Wei Chen,et al. Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources , 2014, 1407.1924.
[10] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[11] Chun-Yan Li,et al. Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.
[12] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[13] Xiang-Bin Wang,et al. Erratum: Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors [Phys. Rev. A 87, 012320 (2013)] , 2013 .
[14] Qin Wang,et al. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.
[15] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[16] Chun-Mei Zhang,et al. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .
[17] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[18] G. Guo,et al. Measurement-device-independent quantum key distribution with modified coherent state. , 2014, Optics letters.
[19] Yang Wang,et al. Finite-key analysis for one-sided device-independent quantum key distribution , 2013 .
[20] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[21] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[22] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[23] Hoi-Kwong Lo,et al. Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.
[24] Xiang‐Bin Wang,et al. Three-intensity decoy state method for device independent quantum key distribution , 2013, 1309.5886.
[25] Z-B Chen,et al. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions. , 2014, Optics letters.
[26] Dong Liu,et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.
[27] Wan-Su Bao,et al. Biased decoy-state measurement-device-independent quantum key distribution with finite resources , 2015 .
[28] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[29] Wei Chen,et al. Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .
[30] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[31] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[32] M. Fejer,et al. Experimental passive decoy-state quantum key distribution , 2014, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[33] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[34] Agarwal,et al. Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.
[35] Zheng-Fu Han,et al. Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source , 2014, Quantum Information Processing.
[36] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.