High-Speed Implementation of Length-Compatible Privacy Amplification in Continuous-Variable Quantum Key Distribution
暂无分享,去创建一个
Hong Guo | Xiangyu Wang | Song Yu | Yichen Zhang | Song Yu | Hong Guo | Yichen Zhang | Xiangyu Wang
[1] Jean Cardinal,et al. Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.
[2] Eleni Diamanti,et al. Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.
[3] Wanyi Gu,et al. Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.
[4] S. McLaughlin,et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.
[5] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[6] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[7] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[8] Song Yu,et al. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution , 2017 .
[9] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[10] Stefano Pirandola,et al. High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.
[11] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[12] Sébastien Kunz-Jacques,et al. Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation , 2011, Physical Review A.
[13] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[14] T. Richardson,et al. Multi-Edge Type LDPC Codes , 2004 .
[15] Shen-Shen Yang,et al. FPGA-Based Implementation of Size-Adaptive Privacy Amplification in Quantum Key Distribution , 2017, IEEE Photonics Journal.
[16] Eleni Diamanti,et al. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.
[17] Christian Weedbrook,et al. Quantum cryptography without switching. , 2004, Physical review letters.
[18] E. Diamanti,et al. Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution , 2012, 1206.6357.
[19] Xiang Peng,et al. Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2014, CLEO 2014.
[20] Chen Wei,et al. Fast implementation of length-adaptive privacy amplification in quantum key distribution , 2014 .
[21] Hong Guo,et al. High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code , 2017, Scientific Reports.
[22] Mei Li,et al. Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.
[23] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[24] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[25] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[26] Xiangyu Wang,et al. Computing quopit Clifford circuit amplitudes by the sum-over-paths technique , 2016, Quantum Inf. Comput..
[27] P. Grangier,et al. Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.
[28] Douglas R Stinson,et al. Universal hash families and the leftover hash lemma, and applications to cryptography and computing , 2010 .
[29] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[30] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.