Asymmetric sending or not sending twin-field quantum key distribution in practice
暂无分享,去创建一个
Xingyu Zhou | Chunhui Zhang | Qin Wang | Qin Wang | Zong-Wen Yu | Chun-Hui Zhang | Xingyu Zhou | Chun-Mei Zhang | Hai Xu | Chunmei Zhang | Chunhui Zhang | Xiao-Long Hu | C. Jiang | Xiang-Bin Wang
[1] J. Cirac,et al. Long-distance quantum communication with atomic ensembles and linear optics , 2001, Nature.
[2] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[3] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[4] Xiang‐Bin Wang,et al. Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel , 2018, Scientific Reports.
[5] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[6] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[7] Feihu Xu,et al. Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.
[8] Zong-Wen Yu,et al. Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.
[9] S. Pirandola,et al. General Benchmarks for Quantum Repeaters , 2015, 1512.04945.
[10] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[11] Hua-Lei Yin,et al. Measurement-Device-Independent Twin-Field Quantum Key Distribution , 2018, Scientific Reports.
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[13] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[14] Hai Xu,et al. Sending-or-not-sending twin-field quantum key distribution in practice , 2018, Scientific Reports.
[15] Chun-Mei Zhang,et al. Obtaining better performance in the measurement-device-independent quantum key distribution with heralded single-photon sources , 2017 .
[16] Nicolas Gisin,et al. Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.
[17] Jie Lin,et al. Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.
[18] Rong Wang,et al. Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.
[19] Chun-Mei Zhang,et al. Twin-field quantum key distribution with modified coherent states. , 2019, Optics letters.
[20] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[21] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[22] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[23] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[24] Xiongfeng Ma,et al. Phase-Matching Quantum Key Distribution , 2018, Physical Review X.
[25] J. F. Dynes,et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.