Long-distance device-independent quantum key distribution
暂无分享,去创建一个
[1] A. J. Shields,et al. An avalanche-photodiode-based photon-number-resolving detector , 2008, 0807.0330.
[2] Erik Woodhead,et al. Device-independent quantum key distribution with single-photon sources , 2018, Quantum.
[3] Nicolas Gisin,et al. Faithful entanglement swapping based on sum-frequency generation. , 2011, Physical review letters.
[4] J. S. BELLt. Einstein-Podolsky-Rosen Paradox , 2018 .
[5] P. Kok,et al. Postselected versus nonpostselected quantum teleportation using parametric down-conversion , 1999, quant-ph/9903074.
[6] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[7] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[8] Xiongfeng Ma,et al. High speed device-independent quantum random number generation without detection loophole , 2017, 2018 Conference on Lasers and Electro-Optics (CLEO).
[9] Xiongfeng Ma,et al. Efficient heralding of photonic qubits with applications to device-independent quantum key distribution , 2011, 1105.2811.
[10] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[11] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[12] Omar Fawzi,et al. Entropy Accumulation , 2016, Communications in Mathematical Physics.
[13] Li Qian,et al. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.
[14] Omar Fawzi,et al. Entropy Accumulation With Improved Second-Order Term , 2018, IEEE Transactions on Information Theory.
[15] W. Grice. Arbitrarily complete Bell-state measurement using only linear optical elements , 2011 .
[16] T. Ralph,et al. Nondeterministic Noiseless Linear Amplification of Quantum Systems , 2009 .
[17] F. Marsili,et al. Detecting single infrared photons with 93% system efficiency , 2012, 1209.5774.
[18] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[19] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[20] Adam D. Smith,et al. Leftover Hashing Against Quantum Side Information , 2011, IEEE Transactions on Information Theory.
[21] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[22] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[23] Peter van Loock,et al. 3/4-Efficient Bell measurement with passive linear optics and unentangled ancillae. , 2014, Physical review letters.
[24] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[25] Omar Fawzi,et al. M ay 2 01 8 Entropy accumulation with improved second-order , 2018 .
[26] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[27] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[28] S. Wehner,et al. Bell Nonlocality , 2013, 1303.2849.
[29] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[30] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[31] H. Lo,et al. Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.
[32] N. Gisin,et al. A local hidden variable model of quantum correlation exploiting the detection loophole , 1999 .
[33] Masahide Sasaki,et al. Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.
[34] Umesh V. Vazirani,et al. Fully device independent quantum key distribution , 2012, Commun. ACM.
[35] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[36] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[37] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[38] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[39] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[40] S Wehner,et al. Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.
[41] S. Wehner,et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.
[42] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[43] H. Lo,et al. Quantum key distribution with entangled photon sources , 2007, quant-ph/0703122.
[44] T. Moroder,et al. Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.
[45] Qiang Zhang,et al. Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.
[46] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[47] Renato Renner,et al. The ultimate physical limits of privacy , 2014, Nature.
[48] Hoi-Kwong Lo,et al. Foiling covert channels and malicious classical post-processing units in quantum key distribution , 2017, npj Quantum Information.
[49] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[50] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[51] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[52] Yaoyun Shi,et al. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices , 2014, STOC.
[53] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[54] N. Gisin,et al. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.
[55] Marco Lucamarini,et al. Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.
[56] P. Pearle. Hidden-Variable Example Based upon Data Rejection , 1970 .