Device-independent quantum key distribution from generalized CHSH inequalities
暂无分享,去创建一个
[1] L. Mirsky. A trace inequality of John von Neumann , 1975 .
[2] B Kraus,et al. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.
[3] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[4] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[5] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[6] Aaron J. Miller,et al. Detection-loophole-free test of quantum nonlocality, and applications. , 2013, Physical review letters.
[7] Pavel Sekatski,et al. What is the minimum CHSH score certifying that a state resembles the singlet? , 2020, Quantum.
[8] P. Sekatski,et al. Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution. , 2020, Physical review letters.
[9] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[10] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[11] Isaac L. Chuang,et al. Quantum Computation and Quantum Information (10th Anniversary edition) , 2011 .
[12] Ivan vSupi'c,et al. Self-testing of quantum systems: a review , 2019, Quantum.
[13] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[14] Umesh V. Vazirani,et al. Robust device independent quantum key distribution , 2014, ITCS.
[15] Eberhard,et al. Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.
[16] Graeme Smith,et al. Noisy processing and distillation of private quantum States. , 2007, Physical review letters.
[17] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[18] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[19] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[20] Xiongfeng Ma,et al. Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD , 2011, Quantum Inf. Comput..
[21] A. Zeilinger,et al. Bell violation using entangled photons without the fair-sampling assumption , 2012, Nature.
[22] Yang Liu,et al. Device-independent quantum random-number generation , 2018, Nature.
[23] Pavel Sekatski,et al. Setting up experimental Bell test with reinforcement learning , 2020, Physical review letters.
[24] Le Phuc Thinh,et al. Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.
[25] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.
[26] Shihan Sajeed,et al. Attacking quantum key distribution by light injection via ventilation openings , 2020, PloS one.
[28] N. Gisin,et al. From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.
[29] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[30] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[31] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[32] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[33] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[34] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[35] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[36] J. Bancal,et al. What is the minimum CHSH score certifying that a state resembles the singlet? , 2019, Quantum.