Security of quantum key distribution with iterative sifting
暂无分享,去创建一个
Hoi-Kwong Lo | Koji Azuma | Go Kato | Kiyoshi Tamaki | Akihiro Mizutani | Marcos Curty | Charles Ci Wen Lim
[1] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[2] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[3] R. Serfling. Probability Inequalities for the Sum in Sampling without Replacement , 1974 .
[4] H. Lo,et al. Performance of two quantum-key-distribution protocols , 2006 .
[5] Patrick J. Coles,et al. Sifting attacks in finite-size quantum key distribution , 2015, 1506.07502.
[6] M. Koashi,et al. Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse , 2006, quant-ph/0607082.
[7] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[8] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[9] Ericka Stricklin-Parker,et al. Ann , 2005 .
[10] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[11] J-C Boileau,et al. Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.
[12] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[13] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[14] Marco Tomamichel,et al. A largely self-contained and complete security proof for quantum key distribution , 2015, 1506.08458.
[15] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[16] Akihiro Mizutani,et al. Finite-key security analysis of quantum key distribution with imperfect light sources , 2015, 1504.08151.
[17] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[18] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[19] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[20] Hoi-Kwong Lo,et al. Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.
[21] M. Hayashi,et al. Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths , 2011, 1107.0589.