Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
暂无分享,去创建一个
[1] Physical Review , 1965, Nature.
[2] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[3] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[4] Pochi Yeh,et al. Photonics: Optical Electronics in Modern Communications (The Oxford Series in Electrical and Computer Engineering) , 1997 .
[5] Axthonv G. Oettinger,et al. IEEE Transactions on Information Theory , 1998 .
[6] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[7] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[8] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[9] Michael Priestley,et al. Proceedings of IEEE Professional Communication Society International Professional Communication Conference and Proceedings of the 18th Annual ACM International Conference on Computer Documentation: Technology & Teamwork, Cambridge, Massachusetts, USA, September 24-27, 2000 , 2000, SIGDOC.
[10] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[11] Andrew G. Glen,et al. APPL , 2001 .
[12] T. Nishioka,et al. "Circular type" quantum key distribution , 2001, IEEE Photonics Technology Letters.
[13] H. Chau. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .
[14] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[15] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[16] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[17] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[18] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[19] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[20] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[21] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[22] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[23] P. Yeh,et al. Photonics : optical electronics in modern communications , 2006 .
[24] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[25] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[26] New Journal of Physics The , 2007 .
[27] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[28] Christian Kurtsiefer,et al. Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.
[29] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[30] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[31] Oleg E. Melnik,et al. Encyclopedia of Complexity and Systems Science , 2008 .
[32] Xiongfeng Ma,et al. Security proof of quantum key distribution with detection efficiency mismatch , 2008, Quantum Inf. Comput..
[33] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[34] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[35] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.