Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD
暂无分享,去创建一个
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[3] October I. Physical Review Letters , 2022 .
[4] Axthonv G. Oettinger,et al. IEEE Transactions on Information Theory , 1998 .
[5] Michele Mosca,et al. Generalized Self-testing and the Security of the 6-State Protocol , 2010, TQC.
[6] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[9] D. Vernon. Inform , 1995, Encyclopedia of the UN Sustainable Development Goals.
[10] Andrew G. Glen,et al. APPL , 2001 .
[11] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[12] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[13] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).