Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier
暂无分享,去创建一个
Ying Guo | Guihua Zeng | Jinjing Shi | Ronghua Shi | Fangli Yang | Guihua Zeng | Ying Guo | Ronghua Shi | Jinjing Shi | Fangli Yang
[1] Nathan Walk,et al. Security of continuous-variable quantum cryptography with Gaussian postselection , 2013 .
[2] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[3] N. Walk,et al. Heralded noiseless linear amplification and distillation of entanglement , 2009, 0907.3638.
[4] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[5] Geoff J. Pryde,et al. Heralded noiseless amplification of a photon polarization qubit , 2012, Nature Physics.
[6] Miguel Navascués,et al. Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.
[7] T. Moroder,et al. Testing quantum devices: Practical entanglement verification in bipartite optical systems , 2007, 0711.2709.
[8] M. Bellini,et al. A high-fidelity noiseless amplifier for quantum light states , 2010, 1004.3399.
[9] N. Cerf,et al. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.
[10] N. Cerf,et al. Gaussian postselection and virtual noiseless amplification in continuous-variable quantum key distribution , 2012 .
[11] F. Zhu,et al. Improving the maximum transmission distance of four-state continuous-variable quantum key distribution by using a noiseless linear amplifier , 2012, 1210.0107.
[12] S. Lloyd,et al. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.
[13] Timothy C. Ralph,et al. Quantum error correction of continuous-variable states against Gaussian noise , 2011 .
[14] Nathan Walk,et al. Measurement-based noiseless linear amplification for quantum communication , 2014, Nature Photonics.
[15] L. Liang,et al. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.
[16] Anthony Leverrier,et al. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation , 2009, 0912.4132.
[17] Marco Barbieri,et al. Nondeterministic noiseless amplification of optical signals: a review of recent experiments , 2011 .
[18] Christian Weedbrook,et al. Continuous-variable quantum key distribution with entanglement in the middle , 2012, 1205.1497.
[19] M. Barbieri,et al. Experimental realization of a nondeterministic optical noiseless amplifier , 2011 .
[20] Marco Barbieri,et al. Implementation of a non-deterministic optical noiseless amplifier , 2010 .
[21] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[22] E. Diamanti,et al. Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.
[23] Frédéric Grosshans. Collective attacks and unconditional security in continuous variable quantum key distribution. , 2005, Physical review letters.
[24] Mark Beck,et al. Ultrafast measurement of optical-field statistics by dc-balanced homodyne detection , 1995 .
[25] A. Acín,et al. Security bounds for continuous variables quantum key distribution. , 2004, Physical review letters.
[26] M. Barbieri,et al. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier , 2012, 1205.0959.
[27] Christian Weedbrook,et al. Quantum cryptography without switching. , 2004, Physical review letters.
[28] E. Diamanti,et al. Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution , 2012, 1206.6357.
[29] Peng Huang,et al. Performance improvement of continuous-variable quantum key distribution via photon subtraction , 2013 .
[30] G. Leuchs,et al. Witnessing effective entanglement in a continuous variable prepare-and-measure setup and application to a quantum key distribution scheme using postselection , 2006, quant-ph/0603271.
[31] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[32] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.