Experimental passive decoy-state quantum key distribution
暂无分享,去创建一个
M. Fejer | Jian-Wei Pan | Qiang Zhang | Fei Zhou | Yang Liu | Xiongfeng Ma | J. Pelc | Cheng-Zhi Peng | Qi-Chao Sun | Weilong Wang | Xianfeng Chen
[1] R. H. Brown,et al. A Test of a New Type of Stellar Interferometer on Sirius , 1956, Nature.
[2] Yurke,et al. Obtainment of thermal noise from a pure quantum state. , 1987, Physical review. A, General physics.
[3] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[4] J. Rarity,et al. Photon statistics of pulsed parametric light , 1998 .
[5] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[6] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[7] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[8] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[9] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[10] V. Scarani,et al. Two independent photon pairs versus four-photon entangled states in parametric down conversion , 2003, quant-ph/0310167.
[11] Hoi-Kwong Lo. Quantum key distribution with vacua or dim pulses as decoy states , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[12] H. Lo,et al. Practical decoy state for quantum key distribution (15 pages) , 2005 .
[13] Xiongfeng Ma. Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.
[14] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[15] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[16] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[17] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[18] Li Qian,et al. Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber , 2006, 2006 IEEE International Symposium on Information Theory.
[19] Passive decoy state quantum key distribution: Closing the gap to perfect sources , 2006, quant-ph/0609195.
[20] C. Silberhorn,et al. Quantum key distribution with passive decoy state selection , 2007 .
[21] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[22] James F. Dynes,et al. Unconditionally secure one-way quantum key distribution using decoy pulses , 2007, QELS 2007.
[23] M. Fejer,et al. Correlated photon-pair generation in reverse-proton-exchange PPLN waveguides with integrated mode demultiplexer at 10 GHz clock. , 2007, Optics express.
[24] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[25] John Preskill,et al. Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..
[26] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[27] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[28] Xiongfeng Ma,et al. QUANTUM CRYPTOGRAPHY: FROM THEORY TO PRACTICE , 2007, quant-ph/0702202.
[29] Tao Zhang,et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.
[30] H. Lo,et al. Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.
[31] Xiongfeng Ma. Quantum cryptography: theory and practice , 2008 .
[32] David Elkouss,et al. Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.
[33] T. Moroder,et al. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.
[34] Jian Wang,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.
[35] Jian-Wei Pan,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.
[36] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[37] G. Guo,et al. Practical non-Poissonian light source for passive decoy state quantum key distribution. , 2010, Optics letters.
[38] N. Lutkenhaus,et al. Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals , 2010, 1009.3830.
[39] Xiang‐Bin Wang,et al. Reexamination of the decoy-state quantum key distribution with an unstable source , 2010 .
[40] Chun-Yan Li,et al. Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.
[41] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .
[42] 张阳,et al. Experimental demonstration of passive decoy state quantum key distribution , 2012 .
[43] Guo Guangcan,et al. Experimental demonstration of passive decoy state quantum key distribution , 2012 .
[44] Jian-Wei Pan,et al. Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.
[45] L. Zhang,et al. Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.
[46] M. Fejer,et al. Ultralow noise up-conversion detector and spectrometer for the telecom band. , 2013, Optics express.
[47] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[48] Yang Wang,et al. Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuations , 2013, 1312.7383.
[49] M. Fejer,et al. Experimental passive decoy-state quantum key distribution , 2014, CLEO 2014.