Coherence-assisted non-Gaussian measurement-device-independent quantum key distribution
暂无分享,去创建一个
[1] L. Zhang,et al. Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.
[2] T. Ralph,et al. Continuous variable quantum cryptography , 1999, quant-ph/9907073.
[3] Se-Wan Ji,et al. Enhancing quantum entanglement for continuous variables by a coherent superposition of photon subtraction and addition , 2011, 1107.2771.
[4] Ying Guo,et al. Continuous-variable quantum key distribution with non-Gaussian quantum catalysis , 2018, Physical Review A.
[5] M. Suhail Zubairy,et al. Continuous-variable entanglement via multiphoton catalysis , 2017 .
[6] Anthony Leverrier,et al. Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.
[7] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[8] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[9] S. Pirandola,et al. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.
[10] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[11] L. Liang,et al. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.
[12] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[13] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[14] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[15] Nicolas J. Cerf,et al. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables , 2003, Quantum Inf. Comput..
[16] N. Cerf,et al. Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.
[17] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[18] F. Illuminati,et al. Continuous-variable quantum teleportation with non-Gaussian resources , 2007, 0706.3701.
[19] Peng Huang,et al. Performance improvement of continuous-variable quantum key distribution via photon subtraction , 2013 .
[20] Fuli Li,et al. Entanglement properties of non-Gaussian resources generated via photon subtraction and addition and continuous-variable quantum-teleportation improvement , 2009 .
[21] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[22] Anthony Leverrier,et al. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.
[23] M. S. Kumar,et al. Quantitative study of beam-splitter-generated entanglement from input states with multiple nonclassicality-inducing operations , 2016, 1611.06736.
[24] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[25] S. Lloyd,et al. High-rate quantum cryptography in untrusted networks , 2013, 1312.4104.
[26] Philippe Grangier,et al. Increasing entanglement between Gaussian states by coherent photon subtraction. , 2006, Physical review letters.
[27] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[28] Ying Guo,et al. Self-referenced continuous-variable measurement-device-independent quantum key distribution , 2018 .
[29] Philip Walther,et al. Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.
[30] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[31] Bingjie Xu,et al. Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution , 2016, 1601.02799.
[32] Bingjie Xu,et al. Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction , 2017, 1711.04225.
[33] Stefano Pirandola,et al. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables , 2017, 1707.04599.
[34] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[35] Jeffrey H. Shapiro,et al. Enhancing quantum entanglement by photon addition and subtraction , 2012 .
[36] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[37] Xiang Peng,et al. Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[38] Peng Huang,et al. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction , 2017, 1711.05978.
[39] M. Hillery. Quantum cryptography with squeezed states , 1999, quant-ph/9909006.
[40] Samuel L. Braunstein,et al. Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.
[41] Peter van Loock,et al. Distillation of mixed-state continuous-variable entanglement by photon subtraction , 2010, 1009.4888.
[42] J. Cirac,et al. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.
[43] Renato Renner,et al. Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.