An Overview on the Post-processing Procedure in Quantum Key Distribution
暂无分享,去创建一个
[1] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[2] Wei Chen,et al. Delayed error verification in quantum key distribution , 2014 .
[3] Q. Cai,et al. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol , 2011, 1111.4411.
[4] Gilles Van Assche,et al. Quantum cryptography and secret-key distillation , 2006 .
[5] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[6] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[7] David A. Pearson,et al. High‐speed QKD Reconciliation using Forward Error Correction , 2004 .
[8] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[9] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[10] Chen Wei,et al. Fast implementation of length-adaptive privacy amplification in quantum key distribution , 2014 .
[11] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[12] Chen Wei,et al. Efficient error estimation in quantum key distribution , 2015 .
[13] Masahito Hayashi,et al. Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics , 2007, 0705.3081.
[14] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[17] David Elkouss,et al. Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.