Experimental realization of three quantum key distribution protocols
暂无分享,去创建一个
Bikash K. Behera | Prasanta K. Panigrahi | B. K. Behera | Aakash Warke | P. Panigrahi | Aakash Warke
[1] Jane E. Nordholt,et al. Refining Quantum Cryptography , 2011, Science.
[2] Li Jing,et al. Quantum cloning machines and the applications , 2013, 1301.2956.
[3] Norbert Lutkenhaus,et al. Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol , 2012, 1206.6668.
[4] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[5] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[6] J. Bell. On the Einstein-Podolsky-Rosen paradox , 1964 .
[7] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[8] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[9] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[10] Fibirova Jana,et al. Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .
[11] David McMahon. Quantum Computing Explained , 2007 .
[12] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[13] Naya Nagy,et al. Quantum Cryptography on IBM QX , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).
[14] Andrew J. Shields,et al. Long-distance quantum key distribution secure against coherent attacks , 2017 .
[15] Diego Garc'ia-Mart'in,et al. Five Experimental Tests on the 5-Qubit IBM Quantum Computer , 2017, 1712.05642.
[16] Anirban Pathak,et al. Elements of Quantum Computation and Quantum Communication , 2013 .
[17] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[18] Marco Lucamarini,et al. Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.