Efficient bit sifting scheme of post-processing in quantum key distribution
暂无分享,去创建一个
Hong Guo | Qiong Li | Xiamu Niu | Xianyan Wu | Dan Le | X. Niu | Qiong Li | Hong Guo | Dan Le | Xianyan Wu
[1] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[2] W. Marsden. I and J , 2012 .
[3] Lei Zhou,et al. A Real-Time QKD System Based on FPGA , 2012, Journal of Lightwave Technology.
[4] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[5] Ahmad-Reza Sadeghi,et al. Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers , 2008, WEWoRC.
[6] Sébastien Kunz-Jacques,et al. High performance error correction for quantum key distribution using polar codes , 2014, Quantum Inf. Comput..
[7] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[8] Bert den Boer. A Simple and Key-Economical Unconditional Authentication Scheme , 1993, J. Comput. Secur..
[9] O. Sangaroon,et al. Secret key reconciliation using BCH code in quantum key distribution , 2007, 2007 International Symposium on Communications and Information Technologies.
[10] Christopher Portmann,et al. Key Recycling in Authentication , 2012, IEEE Transactions on Information Theory.
[11] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[12] Alan Mink. Custom hardware to eliminate bottlenecks in QKD throughput performance , 2007, SPIE Optics East.
[13] N. Gisin,et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.
[14] Aysajan Abidin,et al. New Universal Hash Functions , 2011, WEWoRC.
[15] Richard Johnsonbaugh,et al. Foundations of mathematical analysis , 1981 .
[16] Pascal Junod,et al. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing , 2013, 1309.2583.
[17] Thomas Johansson,et al. On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.
[18] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[19] Wei Chen,et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.
[20] Qiong Li,et al. A Design and Implementation of Multi-thread Quantum Key Distribution Post-processing Software , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[21] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[22] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[23] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[24] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[25] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[26] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[27] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[28] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[29] Hong Guo,et al. An Implementation of Post-Processing Software in Quantum Key Distribution , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.
[30] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[31] V. Scarani,et al. Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.
[32] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[33] J. Dynes,et al. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.
[34] Mario Pivk,et al. Applied Quantum Cryptography , 2010 .
[35] A. Tajima,et al. High-Speed Quantum Key Distribution System for 1-Mbps Real-Time Key Generation , 2012, IEEE Journal of Quantum Electronics.
[36] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[37] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[38] A R Dixon,et al. Continuous operation of high bit rate quantum key distribution , 2010, 1005.4573.
[39] C. G. Peterson,et al. Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.
[40] David Elkouss,et al. Blind reconciliation , 2012, Quantum Inf. Comput..