A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light
暂无分享,去创建一个
Feng Zhu | Qin Wang | Xingyu Zhou | Ai-Ping Liu | Qin Wang | Xingyu Zhou | Aiping Liu | Fengzheng Zhu
[1] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[2] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[3] Qin Wang,et al. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.
[4] Xiang‐Bin Wang,et al. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100% , 2014 .
[5] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[6] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[7] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[9] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[10] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[11] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[12] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[13] V. Scarani,et al. One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering , 2011, 1109.1435.
[14] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[15] C. Silberhorn,et al. Quantum key distribution with passive decoy state selection , 2007 .
[16] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[17] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[18] Wei Chen,et al. Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .
[19] H. Lo,et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.
[20] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[21] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[22] H. Lo,et al. Practical decoy state for quantum key distribution (15 pages) , 2005 .
[23] T. Kobayashi,et al. Quantum key distribution with a heralded single photon source , 2007, International Quantum Electronics Conference, 2005..
[24] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[25] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[26] Guang-Can Guo,et al. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source , 2007 .
[27] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[28] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[29] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[30] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[31] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[32] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.