Improved Secret Key Rate in Quantum Key Distribution using highly irregular Low-Density Parity-Check codes
暂无分享,去创建一个
[1] C. G. Peterson,et al. Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.
[2] T. Sugimoto,et al. A Study on Secret key Reconciliation Protocol "Cascade" , 2000 .
[3] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[4] D. Bruß,et al. Optimal universal and state-dependent quantum cloning , 1997, quant-ph/9705038.
[5] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[6] Schumacher,et al. Quantum coding. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[7] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] Chip Elliott,et al. Current status of the DARPA Quantum Network , 2005 .
[9] Maassen,et al. Generalized entropic uncertainty relations. , 1988, Physical review letters.
[10] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[11] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[12] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[13] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[14] Fred Daneshgaran,et al. Information Theory An algorithm for the computation of the minimum distance of LDPC codes , 2006, Eur. Trans. Telecommun..
[15] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[16] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[17] Rüdiger L. Urbanke,et al. Exact thresholds and optimal codes for the binary-symmetric channel and Gallager's decoding algorithm A , 2000, IEEE Transactions on Information Theory.
[18] David J. C. MacKay,et al. Comparison of constructions of irregular Gallager codes , 1999, IEEE Trans. Commun..
[19] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] David A. Pearson,et al. High‐speed QKD Reconciliation using Forward Error Correction , 2004 .
[22] Sae-Young Chung,et al. On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit , 2001, IEEE Communications Letters.
[23] Daniel A. Spielman,et al. Analysis of low density codes and improved designs using irregular graphs , 1998, STOC '98.
[24] Rüdiger L. Urbanke,et al. The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.
[25] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[26] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[27] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[28] W. Tittel,et al. Proof-of-concept of real-world quantum key distribution with quantum frames , 2009, 0901.0612.
[29] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[30] Evangelos Eleftheriou,et al. On the computation of the minimum distance of low-density parity-check codes , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[31] Evangelos Eleftheriou,et al. Progressive edge-growth Tanner graphs , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[32] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[33] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[34] Xiongfeng Ma,et al. Universally composable and customizable post-processing for practical quantum key distribution , 2009, Comput. Secur..
[35] Sarah J. Johnson. Introducing Low-Density Parity-Check Codes , 2008 .
[36] Zixiang Xiong,et al. Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.
[37] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[38] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[39] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[40] H. Lo. Method for decoupling error correction from privacy amplification , 2002, quant-ph/0201030.
[41] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[42] V. Rich. Personal communication , 1989, Nature.
[43] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[44] David Elkouss,et al. Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.
[45] John Preskill,et al. Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.
[46] Vernam. Cipher printing telegraph systems , 1926, Journal of the A.I.E.E..
[47] Peter W. Shor,et al. Algorithms for Quantum Computation: Discrete Log and Factoring (Extended Abstract) , 1994, FOCS 1994.
[48] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[49] Norbert Lutkenhaus,et al. Estimates for practical quantum cryptography , 1998 .
[50] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[51] Ajay Dholakia,et al. Reduced-complexity decoding of LDPC codes , 2005, IEEE Transactions on Communications.
[52] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[53] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[54] Ayoub Otmani,et al. On the Minimum Distance of Generalized LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[55] Johannes Skaar,et al. Security of quantum key distribution with bit and basis dependent detector flaws , 2008, Quantum Inf. Comput..
[56] Rüdiger L. Urbanke,et al. Efficient encoding of low-density parity-check codes , 2001, IEEE Trans. Inf. Theory.
[57] S. McLaughlin,et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.
[58] Ryutaroh Matsumoto. Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols , 2009, ArXiv.
[59] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[60] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[61] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[62] Daniel A. Spielman,et al. Improved low-density parity-check codes using irregular graphs and belief propagation , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[63] David J. C. MacKay,et al. Good Error-Correcting Codes Based on Very Sparse Matrices , 1997, IEEE Trans. Inf. Theory.
[64] Robert Michael Tanner,et al. A recursive approach to low complexity codes , 1981, IEEE Trans. Inf. Theory.
[65] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[66] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[67] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[68] Marten van Dijk,et al. A Practical Protocol for Advantage Distillation and Information Reconciliation , 2003, Des. Codes Cryptogr..
[69] A. Glavieux,et al. Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.
[70] Tong Zhang,et al. On finite precision implementation of low density parity check codes decoder , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).
[71] W. Munro,et al. Low Cost and Compact Quantum Cryptography , 2006, quant-ph/0608213.
[72] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .