Practical Decoy State for Quantum Key Distribution
暂无分享,去创建一个
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Giovanni Mastrobuoni,et al. Preliminary Version , 1994 .
[3] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[4] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[5] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[6] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[7] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[8] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[9] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[10] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[12] Yi Zhao,et al. Experimental Decoy State Quantum Key Distribution Over 15km , 2005 .
[13] Xiongfeng Ma. Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.
[14] J. M. Ettinger,et al. Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.
[15] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[16] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .