Initiated decoy states in quantum key distribution protocol by 3 ways channel
暂无分享,去创建一个
[1] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[2] B. Achiriloaie,et al. VI REFERENCES , 1961 .
[3] L. Oesterling,et al. Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[4] Fr'ed'eric Grosshans,et al. Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting , 2013, 1306.6061.
[5] Wenjie Liu,et al. Mutually authenticated quantum direct communication based on entanglement swapping , 2010, 2010 Sixth International Conference on Natural Computation.
[6] Tzonelih Hwang,et al. EPR quantum key distribution protocols with potential 100% qubit efficiency , 2007, IET Inf. Secur..
[7] Classical Cryptography v / s Quantum Cryptography A Comparative Study , 2012 .
[8] Hong-Wei Li,et al. Security of practical quantum key distribution system , 2011, 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS).
[9] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[10] Shumei Wang,et al. High performance quantum cryptography architectures in IEEE 802.11 WLAN , 2010, 2010 2nd International Conference on Advanced Computer Control.
[11] Wang Xianhui,et al. A quasi quantum secure direct communication protocol with authentication , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[12] Fei Gao,et al. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.
[13] S. Saharudin,et al. A single photon quantum user Bi-directional authentication scheme over noiseless channel , 2012, 2012 IEEE Symposium on Industrial Electronics and Applications.
[14] Robin Blume-Kohout,et al. Streaming Universal Distortion-Free Entanglement Concentration , 2009, IEEE Transactions on Information Theory.
[15] Xiaoyu Li,et al. Quantum information authentication using entangled states , 2006, International Conference on Digital Telecommunications (ICDT'06).
[16] Hideki Imai,et al. On the security of the quantum key distribution using the Mean King Problem , 2010, 2010 International Symposium On Information Theory & Its Applications.
[17] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[18] Zhang Xiao,et al. An Improved Method of Quantum Key Distribution Protocol , 2009, 2009 International Forum on Computer Science-Technology and Applications.
[19] Hoi-Kwong Lo,et al. From Quantum Cheating to Quantum Security , 2000, quant-ph/0111100.
[20] S. Wang,et al. A modified protocol of quantum state sharing based on entanglement swapping and random EPR selection , 2008, 2008 International Conference on Neural Networks and Signal Processing.
[21] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[22] Liju Chen,et al. Quantum Authentication Protocol Using Bell State , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[23] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .