Implementation and security analysis of practical quantum secure direct communication
暂无分享,去创建一个
Liuguo Yin | Qin Huang | Gui-Lu Long | Zhen Sun | Liyuan Song | Wentao Hao | Ruoyang Qi | Zaisheng Lin | Penghao Niu | Jiancun Gao | G. Long | L. Yin | Zhen Sun | Jiancun Gao | Qin Huang | Peng-Hao Niu | Liyuan Song | Zaisheng Lin | Ruoyang Qi | Wentao Hao
[1] Liuguo Yin,et al. Measurement-device-independent quantum communication without encryption. , 2018, Science bulletin.
[2] A. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .
[3] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[4] Wei Zhang,et al. Experimental long-distance quantum secure direct communication. , 2017, Science bulletin.
[5] Jianhua Lu,et al. CodeHop: physical layer error correction and encryption with LDPC-based code hopping , 2016, Science China Information Sciences.
[6] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[7] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[8] Gui-Lu Long,et al. Experimental quantum secure direct communication with single photons , 2015, Light: Science & Applications.
[9] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[10] N. Gisin,et al. “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.
[11] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[12] Shi-Hai Sun,et al. Quantum key distribution based on phase encoding in long-distance communication fiber. , 2010, Optics letters.
[13] Normand J. Beaudry,et al. Security of two-way quantum key distribution , 2013, 1301.3138.
[14] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[15] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[16] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Richard Jozsa,et al. Distinguishability of states and von Neumann entropy , 2000 .
[19] Jianhua Lu,et al. Efficient helicopter−satellite communication scheme based on check-hybrid LDPC coding , 2018, Tsinghua Science and Technology.
[20] Wei Zhang,et al. Quantum Secure Direct Communication with Quantum Memory. , 2016, Physical review letters.
[21] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[22] E. Bach. Discrete Logarithms and Factoring , 1984 .
[23] S. Pirandola,et al. Confidential Direct Communications: A Quantum Approach Using Continuous Variables , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[24] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[25] Stefano Mancini,et al. Deterministic quantum distribution of a d-ary key , 2009, Quantum Inf. Comput..
[26] Charles F. Hockett,et al. A mathematical theory of communication , 1948, MOCO.
[27] M. Martinelli. A universal compensator for polarization changes induced by birefringence on a retracing beam , 1989 .
[28] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[29] Fuguo Deng,et al. Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .
[30] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[31] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[32] N. Gisin,et al. Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1999 .
[33] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[34] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[35] Gui-Lu Long,et al. Measurement-device-independent quantum secure direct communication , 2018, Science China Physics, Mechanics & Astronomy.
[36] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[37] Ajay Dholakia,et al. Efficient implementations of the sum-product algorithm for decoding LDPC codes , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[38] Himanshu Tyagi,et al. Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.
[39] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[40] Mikael Skoglund,et al. Performance Analysis and Design of Two Edge-Type LDPC Codes for the BEC Wiretap Channel , 2013, IEEE Transactions on Information Theory.
[41] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.