Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation
暂无分享,去创建一个
Hong Guo | Yi-Chen Zhang | Zhengyu Li | Song Yu | Yijia Zhao | Song Yu | Zhengyu Li | Hong Guo | Yichen Zhang | Yijia Zhao
[1] Vikram Sharma,et al. No-switching quantum key distribution using broadband modulated coherent light. , 2005, Physical review letters.
[2] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[3] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[4] M. Hayashi,et al. Quantum information with Gaussian states , 2007, 0801.4604.
[5] Miguel Navascués,et al. Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.
[6] Stefano Pirandola,et al. Two-way quantum cryptography at different wavelengths , 2013, 1309.7973.
[7] Maozhu Sun,et al. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection , 2012, 1208.6249.
[8] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[9] Seth Lloyd,et al. Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.
[10] Nathan Killoran,et al. Optimal working points for continuous-variable quantum channels , 2013, 1301.6051.
[11] Stefano Pirandola,et al. High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.
[12] S. Lloyd,et al. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.
[13] Xiang Peng,et al. Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[14] Stefano Mancini,et al. Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation , 2015 .
[15] Wanyi Gu,et al. Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.
[16] S. McLaughlin,et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.
[17] J. Cirac,et al. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.
[18] Stefano Pirandola,et al. General immunity and superadditivity of two-way Gaussian quantum cryptography , 2016, Scientific Reports.
[19] Wanyi Gu,et al. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers , 2014 .
[20] N. Cerf,et al. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.
[21] Wanyi Gu,et al. Security of two-way continuous-variable quantum key distribution with source noise , 2014 .
[22] Seth Lloyd,et al. Correlation matrices of two-mode bosonic systems , 2009, 0902.1502.
[23] Anthony Leverrier,et al. Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.
[24] Eleni Diamanti,et al. Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.
[25] Christian Weedbrook,et al. Quantum cryptography without switching. , 2004, Physical review letters.
[26] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[27] Renato Renner,et al. Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.
[28] Hong Guo,et al. SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL , 2011, 1110.1818.
[29] Samuel L. Braunstein,et al. Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.
[30] Stefano Pirandola,et al. Covariance Matrices under Bell-like Detections , 2012, Open Syst. Inf. Dyn..
[31] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[32] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[33] S. Braunstein,et al. Quantum Information with Continuous Variables , 2004, quant-ph/0410100.