A quantum optical firewall based on simple quantum devices
暂无分享,去创建一个
Morad El Baz | Yassine Hassouni | H. Amellal | A. Meslouhi | A. Meslouhi | H. Amellal | Y. Hassouni | M. Baz
[1] E. Andersson,et al. Experimentally realizable quantum comparison of coherent states and its applications , 2006, quant-ph/0601130.
[2] Morad El Baz,et al. Quantum key distribution via tripartite coherent states , 2011, Quantum Inf. Process..
[3] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[4] A. Meslouhi,et al. A Secure Quantum Communication via Deformed Tripartite Coherent States , 2014 .
[5] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[6] Y. Hassouni,et al. Communication via an entangled coherent quantum network , 2010, 1011.3915.
[7] Mohamed G. Gouda,et al. Diverse Firewall Design , 2008, IEEE Trans. Parallel Distributed Syst..
[8] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[9] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[10] I. D. Ivanović. How to differentiate between non-orthogonal states , 1987 .
[11] John Preskill,et al. Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..
[12] D. Dieks. Communication by EPR devices , 1982 .
[13] Christian Kurtsiefer,et al. Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.
[14] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[15] H. Weinfurter,et al. Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .
[16] Mario Pivk,et al. Applied Quantum Cryptography , 2010 .
[17] M. Baz,et al. Quantum key distribution using optical coherent states via amplitude damping , 2015 .
[18] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[19] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[20] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[21] P. Dirac. Principles of Quantum Mechanics , 1982 .
[22] Feiyi Wang,et al. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[23] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[24] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[25] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[26] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.