A universal coherent source for quantum key distribution
暂无分享,去创建一个
[1] Joseph M Renes,et al. Structured codes improve the Bennett-Brassard-84 quantum key rate. , 2008, Physical review letters.
[2] Leonardo Neves,et al. Generation of entangled states of qudits using twin photons. , 2004, Physical review letters.
[3] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[4] Wolfgang Dür,et al. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .
[5] Hai Xu,et al. Detector dead-time effects and paralyzability in high-speed quantum key distribution , 2007 .
[6] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[7] Zheng-Fu Han,et al. Decoy state quantum key distribution with modified coherent state , 2007, 0704.3833.
[8] Z. Y. Ou,et al. Security improvement by using a modified coherent state for quantum cryptography , 2005 .
[9] Agarwal,et al. Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.
[10] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[11] H. Lo,et al. Practical decoy state for quantum key distribution (15 pages) , 2005 .
[12] H. Lo,et al. Performance of two quantum-key-distribution protocols , 2006 .
[13] S P Walborn,et al. Quantum key distribution with higher-order alphabets using spatially encoded qudits. , 2006, Physical review letters.
[14] Guang-Can Guo,et al. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source , 2007 .
[15] A. R. Dixon,et al. Gigahertz quantum key distribution with InGaAs avalanche photodiodes , 2008 .
[16] Guang-Can Guo,et al. Generation of pair coherent state using weak cross-Kerr media , 2008 .
[17] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[18] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[19] Takayoshi Kobayashi,et al. Decoy state quantum key distribution with a photon number resolved heralded single photon source , 2006 .
[20] Ian A Walmsley,et al. Secure quantum key distribution using continuous variables of single photons. , 2007, Physical review letters.
[21] Wang Xiangbin. Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)] , 2005 .
[22] Tao Zhang,et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.
[23] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[24] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[25] V. Lakshminarayanan,et al. Conditional preparation of states containing a definite number of photons , 2007, 0709.4644.
[26] Qing-yu Cai,et al. Photon-number-resolving decoy-state quantum key distribution , 2006 .
[27] Photon statistics measurement by use of single photon detection , 2004 .
[28] G. Guo,et al. Active phase compensation of quantum key distribution system , 2008 .
[29] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[30] J. M. Ettinger,et al. Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.
[31] C. Elliott. Building the quantum network* , 2002 .
[32] Xiongfeng Ma. Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.
[33] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[34] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[35] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[36] Multiphoton communication in lossy channels with photon-number entangled states , 2006, quant-ph/0612028.
[37] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[38] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.