Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources
暂无分享,去创建一个
Li Liu | Qiao-Yan Wen | Fen-Zhuo Guo | F. Guo | Q. Wen | Li Liu
[1] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[2] Yang Wang,et al. Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuations , 2013, 1312.7383.
[3] H. Weinfurter,et al. Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.
[4] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[5] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[6] Xiongfeng Ma,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012, 1210.3929.
[7] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[8] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[9] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[10] Ting-Ting Song,et al. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources , 2015, Scientific Reports.
[11] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[12] Feihu Xu,et al. Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.
[13] L. Liang,et al. Measurement-device-independent quantum key distribution with a passive decoy-state method , 2014 .
[14] Chun-Yan Li,et al. Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.
[15] Qiaoyan Wen,et al. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .
[16] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[17] H. Lo,et al. Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.
[18] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[19] T. Moroder,et al. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.
[20] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[21] Zheng-Fu Han,et al. Decoy-state theory for the heralded single-photon source with intensity fluctuations , 2009 .
[22] H. Weinfurter,et al. Entanglement-based quantum communication over 144km , 2007 .
[23] C. Silberhorn,et al. Quantum key distribution with passive decoy state selection , 2007 .
[24] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[25] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[26] Chun-Mei Zhang,et al. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .
[27] Wan-Su Bao,et al. Biased decoy-state measurement-device-independent quantum key distribution with finite resources , 2015 .
[28] Feihu Xu,et al. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.
[29] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[30] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[31] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[32] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[33] Xiang‐Bin Wang,et al. Reexamination of the decoy-state quantum key distribution with an unstable source , 2010 .
[34] Xiang-bin Wang,et al. Decoy state method for measurement device independent quantum key distribution with different intensities in only one basis , 2013, 1309.0471.
[35] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[36] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[37] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[38] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[39] Fei Gao,et al. Finite-key analysis for quantum key distribution with decoy states , 2011, Quantum Inf. Comput..
[40] Qiaoyan Wen,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .
[41] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .
[42] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[43] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .