Practical issues of twin-field quantum key distribution
暂无分享,去创建一个
Wei Chen | Zheng-Fu Han | Guang-Can Guo | Zhen-Qiang Yin | De-Yong He | Bing-Jie Xu | Wei Huang | Feng-Yu Lu | Shuang Wang | Wei Chen | G. Guo | Z. Han | Zhen-Qiang Yin | Shuang Wang | Wei Huang | De-Yong He | Feng-Yu Lu | Guan-Jie Fan-Yuan | Rong Wang | Rong-Wang | Guan-Jie Fan-Yuan | Bingjie Xu | Guan-Jie Fan-Yuan | Z. Yin
[1] S. Guha,et al. Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.
[2] Hoi-Kwong Lo,et al. Simple security proof of twin-field type quantum key distribution protocol , 2018, npj Quantum Information.
[3] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[4] Qiang Zhang,et al. Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.
[5] Xiongfeng Ma,et al. Phase-Matching Quantum Key Distribution , 2018, Physical Review X.
[6] J. F. Dynes,et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.
[7] Xingyu Zhou,et al. Asymmetric sending or not sending twin-field quantum key distribution in practice , 2019, Physical Review A.
[8] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[9] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[10] Jie Lin,et al. Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.
[11] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[12] G. Guo,et al. Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .
[13] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[14] Jianqiang Liu,et al. Generation of Stable and High Extinction Ratio Light Pulses for Continuous Variable Quantum Key Distribution , 2015, IEEE Journal of Quantum Electronics.
[15] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[16] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[17] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[18] Li Qian,et al. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.
[19] Shuang Wang,et al. Parameter optimization and real-time calibration of a measurement-device-independent quantum key distribution network based on a back propagation artificial neural network , 2018, Journal of the Optical Society of America B.
[20] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[21] Jörn Müller-Quade,et al. Composability in quantum cryptography , 2009, ArXiv.
[22] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[23] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[24] Shuang Wang,et al. Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.
[25] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[26] S. Pirandola,et al. General Benchmarks for Quantum Repeaters , 2015, 1512.04945.
[27] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[28] R. Eberhart,et al. Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).
[29] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[30] V. Scarani,et al. Finite-key security against coherent attacks in quantum key distribution , 2010, 1008.2596.
[31] Shuang Wang,et al. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.
[32] Zheng-Fu Han,et al. Security of counterfactual quantum cryptography , 2010, 1007.3066.
[33] Masato Koashi,et al. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit , 2019, Nature Communications.
[34] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[35] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[36] Chun-Mei Zhang,et al. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .
[37] Marco Lucamarini,et al. Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.
[38] Matthias Christandl,et al. Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.
[39] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[40] Rong Wang,et al. Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.
[41] Qin Wang,et al. Implementing full parameter optimization on decoy-state measurement-device-independent quantum key distributions under realistic experimental conditions , 2017 .
[42] Zong-Wen Yu,et al. Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.
[43] J-C Boileau,et al. Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.
[44] F. Bussières,et al. Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.
[45] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.