Device-independent quantum cryptography for continuous variables
暂无分享,去创建一个
[1] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[2] S. Glancy,et al. All-optical generation of states for "Encoding a qubit in an oscillator". , 2010, Optics letters.
[3] Mario Berta,et al. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .
[4] C. Broadbent,et al. Bell violation for unknown continuous-variable states , 2013, 1302.6134.
[5] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[6] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[7] John Preskill,et al. Secure quantum key distribution using squeezed states , 2001 .
[8] T. Moroder,et al. Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.
[9] V. Scarani,et al. One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering , 2011, 1109.1435.
[10] N. Gisin,et al. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.
[11] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[12] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[13] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[14] Stefano Mancini,et al. Constructing finite-dimensional codes with optical continuous variables , 2004 .
[15] Andrew Chi-Chih Yao,et al. Self testing quantum apparatus , 2004, Quantum Inf. Comput..
[16] Moritz Mehmet,et al. Squeezed light at 1550 nm with a quantum noise reduction of 12.3 dB. , 2011, Optics express.
[17] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[18] Renato Renner,et al. The ultimate physical limits of privacy , 2014, Nature.
[19] T. Ralph,et al. Violations of Bell's inequality for Gaussian states with homodyne detection and nonlinear interactions , 2008, 0807.2556.
[20] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[21] Margaret D. Reid,et al. Detecting faked continuous-variable entanglement using one-sided device-independent entanglement witnesses , 2013, 1312.6725.
[22] J. Bell. On the Einstein-Podolsky-Rosen paradox , 1964 .
[23] R. Renner,et al. Device-Independent Quantum Key Distribution with Local Bell Test , 2012, 1208.0023.
[24] Vitus Händchen,et al. Quantum enhancement of the zero-area Sagnac interferometer topology for gravitational wave detection. , 2010, Physical review letters.
[25] J. Preskill,et al. Encoding a qubit in an oscillator , 2000, quant-ph/0008040.
[26] Maximal violation of Bell inequalities using continuous-variable measurements , 2002, quant-ph/0211067.
[27] C. Monroe,et al. Experimental violation of a Bell's inequality with efficient detection , 2001, Nature.
[28] S. Braunstein,et al. Quantum Information with Continuous Variables , 2004, quant-ph/0410100.
[29] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[30] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[31] Xiongfeng Ma,et al. Efficient heralding of photonic qubits with applications to device-independent quantum key distribution , 2011, 1105.2811.
[32] N. C. Menicucci,et al. Fault-tolerant measurement-based quantum computing with continuous-variable cluster states. , 2013, Physical review letters.
[33] A. Zeilinger,et al. Speakable and Unspeakable in Quantum Mechanics , 1989 .
[34] G. J. Milburn,et al. Preparing encoded states in an oscillator , 2002 .
[35] N. Brunner,et al. Bell tests for continuous-variable systems using hybrid measurements and heralded amplifiers , 2012, 1203.0320.
[36] Stefano Mancini,et al. Generating continuous variable quantum codewords in the near-field atomic lithography , 2005, quant-ph/0510053.
[37] Loophole-free test of quantum nonlocality using high-efficiency homodyne detectors , 2004, quant-ph/0407181.
[38] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[39] C. J. Foster,et al. Bell inequalities for continuous-variable correlations. , 2007, Physical review letters.
[40] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[41] Stefano Mancini,et al. Continuous variable encoding by ponderomotive interaction , 2005 .
[42] M. Hillery. Quantum cryptography with squeezed states , 1999, quant-ph/9909006.
[43] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[44] N. C. Menicucci,et al. Quantum Computing with Continuous-Variable Clusters , 2009, 0903.3233.
[45] S. Braunstein,et al. Quantum computation over continuous variables , 1998 .