Quantum key distribution with simply characterized light sources
暂无分享,去创建一个
Toshihiko Sasaki | Akihiro Mizutani | Kiyoshi Tamaki | Yuki Takeuchi | Masato Koashi | M. Koashi | K. Tamaki | Yuki Takeuchi | Toshihiko Sasaki | Akihiro Mizutani
[1] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[2] Nobuyuki Imoto,et al. Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws , 2015 .
[3] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[4] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[5] Masato Koashi,et al. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses , 2018 .
[6] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[7] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[8] Shihan Sajeed,et al. Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing , 2014, ArXiv.
[9] Masato Koashi,et al. A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance , 2017, 1701.08509.
[10] Bing Qi,et al. Practical challenges in quantum key distribution , 2016, npj Quantum Information.
[11] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[12] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[13] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[14] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[15] Marco Tomamichel,et al. A largely self-contained and complete security proof for quantum key distribution , 2015, 1506.08458.
[16] Hoi-Kwong Lo,et al. Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.
[17] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[18] Toshihiko Sasaki,et al. Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity , 2017 .
[19] Yoshihisa Yamamoto,et al. Differential-phase-shift quantum key distribution using coherent light , 2003 .
[20] Masato Koashi,et al. Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.
[21] Masato Koashi,et al. Rigorous characterization method for photon-number statistics. , 2019, Optics express.
[22] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[23] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[24] John Preskill,et al. Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.
[25] Hoi-Kwong Lo,et al. Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.
[26] Hoi-Kwong Lo,et al. Quantum key distribution with setting-choice-independently correlated light sources , 2018 .
[27] Zhu Cao,et al. Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.
[28] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[29] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[30] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[31] Yoshihisa Yamamoto,et al. Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.
[32] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[33] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.