Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
暂无分享,去创建一个
Zhi Ma | Weilong Wang | Xiang-dong Meng | Yang-yang Fei | Weilong Wang | Xiangdong Meng | Zhi Ma | Y. Fei | X. Meng | Yang-yang Fei
[1] Andrew J. Shields,et al. Long-distance quantum key distribution secure against coherent attacks , 2017 .
[2] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[3] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[4] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[5] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[6] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[7] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[8] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[9] J. Dynes,et al. Unconditionally secure one-way quantum key distribution using decoy pulses , 2007, 2007 Quantum Electronics and Laser Science Conference.
[10] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[11] Akihiro Mizutani,et al. Finite-key security analysis of quantum key distribution with imperfect light sources , 2015, 1504.08151.
[12] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[13] Marco Lucamarini,et al. Decoy-state quantum key distribution with a leaky source , 2016, New Journal of Physics.
[14] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[15] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[16] Jian Wang,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.
[17] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[18] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[19] Marcos Curty,et al. Finite-key security analysis for quantum key distribution with leaky sources , 2018, New Journal of Physics.
[20] R. Serfling. Probability Inequalities for the Sum in Sampling without Replacement , 1974 .
[21] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[22] Hugo Zbinden,et al. Finite-key analysis for the 1-decoy state QKD protocol , 2018, 1801.03443.
[23] James F. Dynes,et al. Practical security bounds against the Trojan-horse attack in quantum key distribution , 2015, 1506.01989.
[24] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[25] Jian-Wei Pan,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.
[26] Yongmei Huang,et al. Satellite-to-ground quantum key distribution , 2017, Nature.