Security of six-state quantum key distribution protocol with threshold detectors
暂无分享,去创建一个
[1] Peter Kulchyski. and , 2015 .
[2] Masato Koashi,et al. Security of entanglement-based quantum key distribution with practical detectors , 2008 .
[3] T. Tsurumaru. Squash operator and symmetry , 2009, 0910.2326.
[4] J-C Boileau,et al. Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.
[5] K. Stetson,et al. Progress in optics , 1980, IEEE Journal of Quantum Electronics.
[6] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[7] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[8] K. Tamaki,et al. Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing , 2010, 1002.3199.
[9] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[10] R. Renner. Symmetry of large physical systems implies independence of subsystems , 2007 .
[11] N. Lutkenhaus. Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.
[12] M. Dušek,et al. Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.
[13] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[14] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[15] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[16] Charles H. Bennett,et al. Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[17] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[18] Hoi-Kwong Lo,et al. Universal squash model for optical communications using linear optics and threshold detectors , 2011 .
[19] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[20] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[21] M. Koashi. Complementarity, distillable secret key, and distillable entanglement , 2007, 0704.3661.
[22] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[23] T. Moroder,et al. Detector decoy quantum key distribution , 2008, 0811.0027.
[24] GuoDong Kang,et al. Asymmetric “4+2” protocol for quantum key distribution with finite resources , 2013, Quantum Information Processing.
[25] Jun Zhang,et al. Advances in InGaAs/InP single-photon detector systems for quantum communication , 2015, Light: Science & Applications.
[26] K. Tamaki,et al. Security proof for quantum-key-distribution systems with threshold detectors , 2008, 0803.4226.
[27] Normand J. Beaudry,et al. Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.
[28] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[29] Norbert Lutkenhaus,et al. Estimates for practical quantum cryptography , 1998 .