Unconditional security at a low cost
暂无分享,去创建一个
[1] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[2] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[3] C. G. Peterson,et al. Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.
[4] Z. Yuan,et al. Unconditionally secure quantum key distribution over 50 km of standard telecom fibre , 2004, quant-ph/0412173.
[5] N. Gisin,et al. Quantum cryptography , 1998 .
[6] P. Townsend. Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998 .
[7] J. Preskill,et al. Phase randomization improves the security of quantum key distribution , 2005, quant-ph/0504209.
[8] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[9] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[10] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[11] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[12] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[13] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[14] N. Gisin,et al. Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses , 2001, quant-ph/0102062.
[15] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[16] J. M. Ettinger,et al. Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.
[17] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[18] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[19] B Baek,et al. Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.
[20] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[21] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[22] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[23] John Preskill,et al. Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.
[24] P.D. Townsend,et al. Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998, IEEE Photonics Technology Letters.
[25] Norbert Lütkenhaus,et al. ul 2 00 1 Unconditional Security of Practical Quantum Key Distribution , 2008 .
[26] N. Lutkenhaus. Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.
[27] Li Qian,et al. Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber , 2006, 2006 IEEE International Symposium on Information Theory.
[28] N. Gisin,et al. Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.
[29] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[30] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[31] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[32] Barry C. Sanders,et al. Security Aspects of Practical Quantum Cryptography , 2000, EUROCRYPT.
[33] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[34] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[35] M. Bourennane,et al. Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. , 1999, Optics express.
[36] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[37] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[38] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.