Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution
暂无分享,去创建一个
Zhi Ma | Haodong Jiang | Hong Wang | Ming Gao | Weilong Wang | Ming Gao | Zhi Ma | Hong Wang | Haodong Jiang | Hong-xin Li | Hongxin Li | Bao Yan
[1] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[2] Xiongfeng Ma. Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.
[3] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[4] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[5] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Hoi-Kwong Lo. Quantum key distribution with vacua or dim pulses as decoy states , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[9] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[10] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[11] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.
[12] Qiaoyan Wen,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .
[13] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[14] Masahito Hayashi. General theory for decoy-state quantum key distribution with an arbitrary number of intensities , 2007 .
[15] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[16] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[17] Xiang‐Bin Wang,et al. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100% , 2014 .
[18] Zhi Ma,et al. Decoy-state quantum key distribution with biased basis choice , 2013, Scientific Reports.
[19] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.
[20] A R Dixon,et al. Efficient decoy-state quantum key distribution with quantified security. , 2013, Optics express.
[21] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[22] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[23] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[24] Xiang-bin Wang,et al. Decoy state method for measurement device independent quantum key distribution with different intensities in only one basis , 2013, 1309.0471.