Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
暂无分享,去创建一个
Li Qian | Yi Zhao | Xiongfeng Ma | Hoi-Kwong Lo | Bing Qi
[1] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] A. D. Boozer,et al. Deterministic Generation of Single Photons from One Atom Trapped in a Cavity , 2004, Science.
[4] Artur Ekert,et al. Quantum Cryptography with Interferometric Quantum Entanglement , 1994 .
[5] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[6] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[7] Andrew G. Glen,et al. APPL , 2001 .
[8] Michael Pepper,et al. Electrically Driven Single-Photon Source , 2001, Science.
[9] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[10] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[11] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[12] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[13] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[14] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[15] G. Guo,et al. Faraday-Michelson system for quantum cryptography. , 2005, Optics letters.
[16] Herbert Walther,et al. Continuous generation of single photons with controlled waveform in an ion-trap cavity system , 2004, Nature.
[17] Artur Ekert,et al. Information Gain in Quantum Eavesdropping , 1994 .
[18] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[19] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.
[20] Xiang-Bin Wang. A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .
[21] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[22] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[23] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[24] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[25] David Deutsch,et al. Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)] , 1998 .
[26] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.