Secure quantum key distribution with realistic devices
暂无分享,去创建一个
Xiongfeng Ma | Hoi-Kwong Lo | Feihu Xu | Jian-Wei Pan | Qiang Zhang | Jian-Wei Pan | Feihu Xu | H. Lo | Qiang Zhang | Xiongfeng Ma
[1] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Physical Review , 1965, Nature.
[4] P. Pearle. Hidden-Variable Example Based upon Data Rejection , 1970 .
[5] A. Aspect. Proposed experiment to test separable hidden-variable theories , 1975 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[8] D. Dieks. Communication by EPR devices , 1982 .
[9] Hong,et al. Measurement of subpicosecond time intervals between two photons by interference. , 1987, Physical review letters.
[10] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[11] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[12] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] J. Rarity,et al. Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel , 1993 .
[15] Eberhard,et al. Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.
[16] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[17] P. Townsend. Secure key distribution system based on quantum cryptography , 1994 .
[18] James D. Franson,et al. Operational system for quantum cryptography , 1995 .
[19] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[20] Radford M. Neal,et al. Near Shannon Limit Performance of Low Density Parity Check Codes , 1996 .
[21] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[22] Shor,et al. Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[23] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[24] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[25] Charles H. Bennett,et al. Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[26] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[27] Steane,et al. Simple quantum error-correcting codes. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[28] N. Gisin,et al. Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .
[29] H. F. Chau,et al. Why quantum bit commitment and ideal quantum coin tossing are impossible , 1997 .
[30] P. Townsend. Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing , 1997 .
[31] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[32] C. M. Simmons,et al. Practical free-space quantum key distribution over 1 km , 1998 .
[33] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[34] Wolfgang Dür,et al. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .
[35] Nicolas Gisin,et al. Fast and user-friendly quantum key distribution , 2000 .
[36] T. Ralph,et al. Continuous variable quantum cryptography , 1999, quant-ph/9907073.
[37] Norbert Lütkenhaus,et al. ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .
[38] David J. C. MacKay,et al. Comparison of constructions of irregular Gallager codes , 1999, IEEE Trans. Commun..
[39] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[40] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[41] Hideki Imai,et al. Reduced complexity iterative decoding of low-density parity check codes based on belief propagation , 1999, IEEE Trans. Commun..
[42] Richard J. Hughes,et al. Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.
[43] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[44] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[45] P. Kok,et al. Postselected versus nonpostselected quantum teleportation using parametric down-conversion , 1999, quant-ph/9903074.
[46] M. Hillery. Quantum cryptography with squeezed states , 1999, quant-ph/9909006.
[47] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[48] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[49] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[50] M. Reid. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations , 1999, quant-ph/9909030.
[51] Miloslav Dusek,et al. Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .
[52] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[53] H. Weinfurter,et al. Experimental test of quantum nonlocality in three-photon Greenberger–Horne–Zeilinger entanglement , 2000, Nature.
[54] Introduction to homological geometry: part I , 2001, math/0104274.
[55] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[56] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[57] N. Cerf,et al. Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.
[58] M. Bourennane,et al. QUANTUM KEY DISTRIBUTION USING MULTILEVEL ENCODING , 2001 .
[59] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[60] J. Cirac,et al. Long-distance quantum communication with atomic ensembles and linear optics , 2001, Nature.
[61] Dag Roar Hjelme,et al. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography , 2001 .
[62] H. Weinfurter,et al. The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? , 2001, quant-ph/0104103.
[63] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[64] Rüdiger L. Urbanke,et al. The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.
[65] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[66] Yoshihisa Yamamoto,et al. Differential phase shift quantum key distribution. , 2002 .
[67] Richard J. Hughes,et al. Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.
[68] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[69] H. Chau. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .
[70] Hitoshi Inamori,et al. Security of Practical Time-Reversed EPR Quantum Key Distribution , 2002, Algorithmica.
[71] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[72] G Leuchs,et al. Continuous variable quantum cryptography: beating the 3 dB loss limit. , 2002, Physical review letters.
[73] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[74] H. Lo. Method for decoupling error correction from privacy amplification , 2002, quant-ph/0201030.
[75] C. G. Peterson,et al. Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.
[76] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[77] John Preskill,et al. Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.
[78] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[79] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[80] Eric J. Korevaar,et al. Understanding the performance of free-space optics [Invited] , 2003 .
[81] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[82] Norbert Lütkenhaus,et al. Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.
[83] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[84] Kiyoshi Tamaki,et al. Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel , 2003, quant-ph/0308048.
[85] M. Horodecki,et al. Locking classical correlations in quantum States. , 2003, Physical review letters.
[86] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[87] J. Preskill,et al. Superselection rules and quantum protocols , 2003, quant-ph/0310088.
[88] Christian Weedbrook,et al. Quantum cryptography without switching. , 2004, Physical review letters.
[89] M. Ben-Or,et al. General Security Definition and Composability for Quantum & Classical Protocols , 2004, quant-ph/0409062.
[90] M. Fejer,et al. Differential phase shift quantum key distribution experiment over 105 km fibre , 2005, quant-ph/0507110.
[91] R. Renner,et al. An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.
[92] Evangelos Eleftheriou,et al. Regular and irregular progressive edge-growth tanner graphs , 2005, IEEE Transactions on Information Theory.
[93] Hoi Fung Chau,et al. Unconditionally secure key distribution in higher dimensions by depolarization , 2004, IEEE Transactions on Information Theory.
[94] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[95] Vikram Sharma,et al. No-switching quantum key distribution using broadband modulated coherent light. , 2005, Physical review letters.
[96] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.
[97] A. Vaziri,et al. Experimental quantum coin tossing. , 2004, Physical review letters.
[98] Frédéric Grosshans. Collective attacks and unconditional security in continuous variable quantum key distribution. , 2005, Physical review letters.
[99] Xiongfeng Ma. Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.
[100] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[101] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[102] V. Scarani,et al. Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.
[103] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[104] A. Acín,et al. Security bounds for continuous variables quantum key distribution. , 2004, Physical review letters.
[105] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[106] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[107] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[108] Steven W. McLaughlin,et al. Rate-compatible punctured low-density parity-check codes with short block lengths , 2006, IEEE Transactions on Information Theory.
[109] S P Walborn,et al. Quantum key distribution with higher-order alphabets using spatially encoded qudits. , 2006, Physical review letters.
[110] E. Andersson,et al. Experimentally realizable quantum comparison of coherent states and its applications , 2006, quant-ph/0601130.
[111] W. Munro,et al. Low Cost and Compact Quantum Cryptography , 2006, quant-ph/0608213.
[112] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[113] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[114] Seth Lloyd,et al. Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.
[115] H. Lo,et al. Decoy-state quantum key distribution with two-way classical postprocessing , 2006, quant-ph/0604094.
[116] A. Vaziri,et al. Experimental quantum cryptography with qutrits , 2005, quant-ph/0511163.
[117] M. Koashi. Unconditional security of quantum key distribution and the uncertainty principle , 2006 .
[118] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[119] Miguel Navascués,et al. Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.
[120] J. Cirac,et al. Extremality of Gaussian quantum states. , 2005, Physical review letters.
[121] Xiongfeng Ma. Unconditional security at a low cost , 2006 .
[122] Tohya Hiroshima. Additivity and multiplicativity properties of some Gaussian channels for Gaussian inputs , 2006 .
[123] N. Cerf,et al. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.
[124] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[125] S. McLaughlin,et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.
[126] John C Howell,et al. Large-alphabet quantum key distribution using energy-time entangled bipartite States. , 2007, Physical review letters.
[127] C. Silberhorn,et al. Quantum key distribution with passive decoy state selection , 2007 .
[128] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[129] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[130] R. Werner,et al. Reexamination of quantum bit commitment: The possible and the impossible , 2006, quant-ph/0605224.
[131] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[132] J. Dynes,et al. Unconditionally secure one-way quantum key distribution using decoy pulses , 2007, 2007 Quantum Electronics and Laser Science Conference.
[133] Hai Xu,et al. Detector dead-time effects and paralyzability in high-speed quantum key distribution , 2007 .
[134] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[135] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[136] John Preskill,et al. Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..
[137] H. Lo,et al. Quantum key distribution with entangled photon sources , 2007, quant-ph/0703122.
[138] Christian Kurtsiefer,et al. Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.
[139] Renato Renner. Symmetry implies independence , 2007 .
[140] G. Guo,et al. Experimental Decoy Quantum Key Distribution Up To 130KM Fiber , 2007, 0704.2941.
[141] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[142] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[143] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[144] T. Ralph,et al. Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise , 2007, 0705.2627.
[145] H. Lo,et al. Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.
[146] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[147] Andrew W. Sharpe,et al. Erratum: “Unconditionally secure one-way quantum key distribution using decoy pulses” [Appl. Phys. Lett. 90, 011118 (2007)] , 2007 .
[148] M. Fejer,et al. Generation of 10-GHz clock sequential time-bin entanglement. , 2007, Optics express.
[149] Security proof for quantum-key-distribution systems with threshold detectors , 2008, 0803.4226.
[150] Christian Schaffner,et al. Cryptography from noisy storage. , 2007, Physical review letters.
[151] Tao Zhang,et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.
[152] K Horodecki,et al. Unconditional privacy over channels which cannot convey quantum information. , 2008, Physical review letters.
[153] H. J. Kimble,et al. The quantum internet , 2008, Nature.
[154] H. Lo,et al. Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.
[155] Ivan Damgård,et al. Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..
[156] Normand J. Beaudry,et al. Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.
[157] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[158] Guo Guangcan,et al. Experimental Decoy State Quantum Key Distribution Over 120 km Fibre , 2008 .
[159] Akihisa Tomita,et al. Quantum encoder and decoder for practical quantum key distribution using a planar lightwave circuit , 2008 .
[160] J. Dynes,et al. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.
[161] Debbie W. Leung,et al. Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity , 2006, IEEE Transactions on Information Theory.
[162] S. Massar,et al. Experimental quantum tossing of a single coin , 2008, 0804.4411.
[163] Xiongfeng Ma. Quantum cryptography: theory and practice , 2008 .
[164] Richard J. Hughes,et al. Practical long-distance quantum key distribution system using decoy levels , 2008, 0806.3085.
[165] R. Hadfield. Single-photon detectors for optical quantum information applications , 2009 .
[166] Kai Chen,et al. Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.
[167] Nicolas Gisin,et al. Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.
[168] N. Lutkenhaus,et al. Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks , 2008, 0807.3751.
[169] E. Diamanti,et al. Field test of a continuous-variable quantum key distribution prototype , 2008, 0812.3292.
[170] Jian Wang,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.
[171] V. Scarani,et al. Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.
[172] Matthias Christandl,et al. Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.
[173] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[174] Anthony Leverrier,et al. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.
[175] F. Bussières,et al. Flipping quantum coins , 2009, 0904.3946.
[176] H. Weinfurter,et al. Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .
[177] Richard J. Hughes,et al. Optical networking for quantum key distribution and quantum communications , 2009 .
[178] Xiongfeng Ma,et al. Security proof of quantum key distribution with detection efficiency mismatch , 2008, Quantum Inf. Comput..
[179] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[180] J. Cirac,et al. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.
[181] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[182] Stephen M. Barnett,et al. Quantum information , 2005, Acta Physica Polonica A.
[183] Xiongfeng Ma,et al. Universally composable and customizable post-processing for practical quantum key distribution , 2009, Comput. Secur..
[184] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[185] James F. Dynes,et al. Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .
[186] Nicolas Gisin,et al. Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.
[187] Jian-Wei Pan,et al. Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.
[188] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[189] N. Gisin,et al. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.
[190] R. Renner,et al. The uncertainty principle in the presence of quantum memory , 2009, 0909.0950.
[191] A. Chailloux. Improved Loss-Tolerant Quantum Coin Flipping , 2010, 1009.0044.
[192] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.
[193] James F. Dynes,et al. Avoiding the blinding attack in QKD , 2010 .
[194] H. Lo,et al. Feasibility of quantum key distribution through a dense wavelength division multiplexing network , 2010, 1006.0726.
[195] Seth Lloyd,et al. Quantum cryptography approaching the classical limit. , 2010, Physical review letters.
[196] Feihu Xu,et al. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.
[197] Johannes Skaar,et al. Security of quantum key distribution with arbitrary individual imperfections , 2009, 0903.3525.
[198] J. Skaar,et al. After-gate attack on a quantum cryptosystem , 2010, 1009.2683.
[199] Tao Zhang,et al. Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.
[200] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[201] Kai Chen,et al. Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.
[202] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[203] Dong Liu,et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.
[204] Christian Kurtsiefer,et al. Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.
[205] Adam D. Smith,et al. Leftover Hashing Against Quantum Side Information , 2010, IEEE Transactions on Information Theory.
[206] N. Gisin,et al. Long-term performance of the SwissQuantum quantum key distribution network in a field environment , 2011, 1203.4940.
[207] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[208] T. Moroder,et al. Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.
[209] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[210] Hoi-Kwong Lo,et al. Universal squash model for optical communications using linear optics and threshold detectors , 2011 .
[211] Nicolas Brunner,et al. Semi-device-independent security of one-way quantum key distribution , 2011, 1103.4105.
[212] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[213] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[214] Vadim Makarov,et al. Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.
[215] J. F. Dynes,et al. Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography , 2011, 1106.2675.
[216] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[217] J. Skaar,et al. Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.
[218] Mu-Sheng Jiang,et al. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system , 2011, 1203.0739.
[219] Vadim Makarov,et al. Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.
[220] Elham Kashefi,et al. Demonstration of Blind Quantum Computing , 2011, Science.
[221] Chun-Yan Li,et al. Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.
[222] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .
[223] Xiongfeng Ma,et al. Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.
[224] Anindya De,et al. Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..
[225] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[226] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[227] V. Scarani,et al. One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering , 2011, 1109.1435.
[228] P. J. Clarke,et al. Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light , 2012, Nature communications.
[229] Jürg Wullschleger,et al. Unconditional Security From Noisy Quantum Storage , 2009, IEEE Transactions on Information Theory.
[230] Mario Berta,et al. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .
[231] Sae Woo Nam,et al. Conclusive quantum steering with superconducting transition-edge sensors , 2011, Nature Communications.
[232] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[233] Elham Kashefi,et al. Blind quantum computing with weak coherent pulses. , 2011, Physical review letters.
[234] Chun-Mei Zhang,et al. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .
[235] H. Weinfurter,et al. Multiphoton entanglement and interferometry , 2003, 0805.2853.
[236] A. W. Sharpe,et al. Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.
[237] S. Wehner,et al. An experimental implementation of oblivious transfer in the noisy storage model , 2012, Nature Communications.
[238] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[239] He Xu,et al. Postprocessing for quantum random number generators: entropy evaluation and randomness extraction , 2012, ArXiv.
[240] Jean Pierre von der Weid,et al. Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. , 2012, Optics express.
[241] Eleni Diamanti,et al. Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.
[242] Adrian Kent,et al. Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes , 2011, Physical review letters.
[243] Renato Renner,et al. Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.
[244] S. Wehner,et al. Experimental implementation of bit commitment in the noisy-storage model , 2012, Nature Communications.
[245] H. Lo,et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.
[246] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[247] James F. Dynes,et al. A quantum access network , 2013, Nature.
[248] Thomas Brochmann Pedersen,et al. High performance information reconciliation for QKD with CASCADE , 2013, Quantum Inf. Comput..
[249] L. Liang,et al. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.
[250] Agnes Ferenczi,et al. Security proof methods for quantum key distribution protocols , 2013 .
[251] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[252] E. Diamanti,et al. Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.
[253] Mu-Sheng Jiang,et al. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .
[254] Jane E. Nordholt,et al. Network-Centric Quantum Communications with Application to Critical Infrastructure Protection , 2013, ArXiv.
[255] S. Goyal,et al. Higher-dimensional orbital-angular-momentum-based quantum key distribution with mutually unbiased bases , 2013, 1402.5810.
[256] Jian-Wei Pan,et al. Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.
[257] Renato Renner,et al. Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.
[258] S. Lloyd,et al. High-rate quantum cryptography in untrusted networks , 2013, 1312.4104.
[259] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[260] S. Etcheverry,et al. Quantum key distribution session with 16-dimensional photonic states , 2013, Scientific Reports.
[261] Hoi-Kwong Lo,et al. Long distance measurement-device-independent quantum key distribution with entangled photon sources , 2013, 1306.5814.
[262] S. Wehner,et al. Experimental bit commitment based on quantum communication and special relativity. , 2013, Physical review letters.
[263] L. Zhang,et al. Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.
[264] G. Guo,et al. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.
[265] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[266] Feihu Xu,et al. Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.
[267] Jeffrey H. Shapiro,et al. High-dimensional quantum key distribution using dispersive optics , 2012, Physical Review A.
[268] Umesh V. Vazirani,et al. Classical command of quantum systems , 2013, Nature.
[269] L. Liang,et al. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.
[270] Seth Lloyd,et al. Quantum enigma machines , 2013, 1307.0380.
[271] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[272] A R Dixon,et al. Efficient decoy-state quantum key distribution with quantified security. , 2013, Optics express.
[273] Pranab Sen,et al. From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking , 2010, JACM.
[274] Mohsen Razavi,et al. Memory-assisted measurement-device-independent quantum key distribution , 2013, 1309.3406.
[275] Marco Tomamichel,et al. Secure Bit Commitment From Relativistic Constraints , 2012, IEEE Transactions on Information Theory.
[276] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[277] Yoshihisa Yamamoto,et al. Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.
[278] David Elkouss,et al. High-bit-rate continuous-variable quantum key distribution , 2014, 1406.1050.
[279] Erika Andersson,et al. Quantum digital signatures without quantum memory. , 2013, Physical review letters.
[280] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[281] S. Guha,et al. Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.
[282] J G Rarity,et al. Reference-frame-independent quantum-key-distribution server with a telecom tether for an on-chip client. , 2014, Physical review letters.
[283] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[284] Feihu Xu,et al. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.
[285] Jane Qiu,et al. Quantum communications leap out of the lab , 2014, Nature.
[286] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[287] E. Diamanti,et al. Experimental plug and play quantum coin flipping , 2013, Nature Communications.
[288] Zhu Cao,et al. Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.
[289] Gerd Leuchs,et al. Distribution of squeezed states through an atmospheric channel. , 2014, Physical review letters.
[290] R. Penty,et al. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks , 2014, 1402.1508.
[291] Hoi-Kwong Lo,et al. Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.
[292] Hao Qin,et al. Coexistence of continuous variable QKD with intense DWDM classical channels , 2014, 1412.1403.
[293] M. Fejer,et al. Experimental passive decoy-state quantum key distribution , 2014, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[294] Jeffrey H. Shapiro,et al. Entanglement-based quantum communication secured by nonlocal dispersion cancellation , 2014, Physical Review A.
[295] Shihan Sajeed,et al. Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing , 2014, ArXiv.
[296] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[297] Dirk Englund,et al. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. , 2013, Physical review letters.
[298] Andrew Sharpe,et al. Field trial of a quantum secured 10 Gb/s DWDM transmission system over a single installed fiber. , 2014, Optics express.
[299] Umesh Vazirani,et al. Fully device-independent quantum key distribution. , 2012, 1210.1810.
[300] Seth Lloyd,et al. Robust quantum data locking from phase modulation , 2014 .
[301] Hermann Kampermann,et al. Measurement-device-independent quantum key distribution with quantum memories , 2013, 1306.3095.
[302] Xiang Peng,et al. Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[303] C. Wittmann,et al. Atmospheric continuous-variable quantum communication , 2014, 1406.1321.
[304] A. R. Dixon,et al. High speed and adaptable error correction for megabit/s rate quantum key distribution , 2014, Scientific Reports.
[305] Yong Zhao,et al. Experimental unconditionally secure bit commitment. , 2013, Physical review letters.
[306] Wei Chen,et al. Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources , 2014, 1407.1924.
[307] J. Skaar,et al. Laser damage helps the eavesdropper in quantum cryptography. , 2013, Physical review letters.
[308] R. Werner,et al. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement , 2015 .
[309] Fabian Furrer,et al. Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle , 2014, 1405.5965.
[310] Gerd Leuchs,et al. Trojan-horse attacks threaten the security of practical quantum cryptography , 2014, 1406.5813.
[311] P. J. Clarke,et al. Realization of quantum digital signatures without the requirement of quantum memory. , 2013, Physical review letters.
[312] V. Makarov,et al. Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[313] D. Gauthier,et al. High-dimensional quantum cryptography with twisted light , 2014, 1402.7113.
[314] Shuang Wang,et al. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.
[315] Kaushik Chakraborty,et al. Arbitrarily long relativistic bit commitment , 2015, Physical review letters.
[316] V. Dunjko,et al. Quantum digital signatures with quantum-key-distribution components , 2014, 1403.5551.
[317] Hoi-Kwong Lo,et al. Measurement-Device-Independent Quantum Cryptography , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[318] Kai Chen,et al. Experimental multiplexing of quantum key distribution with classical optical communication , 2015 .
[319] Eleni Diamanti,et al. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.
[320] Shihan Sajeed,et al. Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch , 2015, 1502.02785.
[321] Yang Liu,et al. Measurement-device-independent quantum key distribution over untrustful metropolitan network , 2015, 1509.08389.
[322] Gerd Leuchs,et al. Attacks on practical quantum key distribution systems (and how to prevent them) , 2015, 1512.07990.
[323] Xiongfeng Ma,et al. Intrinsic randomness as a measure of quantum coherence , 2015, 1505.04032.
[324] Koji Azuma,et al. All-photonic intercity quantum key distribution , 2015, Nature Communications.
[325] Zhu Cao,et al. Experimental passive round-robin differential phase-shift quantum key distribution. , 2015, Physical review letters.
[326] S. Wehner,et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.
[327] Vladyslav C. Usenko,et al. Unidimensional continuous-variable quantum key distribution , 2015, 1504.07093.
[328] P. Jouguet,et al. Robust shot-noise measurement for continuous-variable quantum key distribution , 2014, 1406.7554.
[329] T Lunghi,et al. Practical Relativistic Bit Commitment. , 2014, Physical review letters.
[330] Feihu Xu. Measurement-device-independent quantum communication with an untrusted source , 2015, 1508.00970.
[331] Bing Qi,et al. Discrete and continuous variables for measurement-device-independent quantum cryptography , 2015, Nature Photonics.
[332] Peng Huang,et al. High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.
[333] Qiang Zhou,et al. Measurement-device-independent quantum key distribution: from idea towards application , 2015, 1501.07307.
[334] Hoi-Kwong Lo,et al. Experimental quantum key distribution with source flaws , 2015 .
[335] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[336] Anthony Leverrier,et al. Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.
[337] Zhen Zhang,et al. Field Test of Measurement-Device-Independent Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[338] Nicolas Gisin,et al. Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[339] Peng Huang,et al. Continuous-variable quantum key distribution with 1 Mbps secure key rate. , 2015, Optics express.
[340] Hoi-Kwong Lo,et al. All-photonic quantum repeaters , 2013, Nature Communications.
[341] Rob Thew,et al. Provably secure and practical quantum key distribution over 307 km of optical fibre , 2014, Nature Photonics.
[342] W. Munro,et al. Inside Quantum Repeaters , 2015, IEEE Journal of Selected Topics in Quantum Electronics.
[343] S. Pirandola,et al. General Benchmarks for Quantum Repeaters , 2015, 1512.04945.
[344] James F. Dynes,et al. Practical security bounds against the Trojan-horse attack in quantum key distribution , 2015, 1506.01989.
[345] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[346] G. Guo,et al. Experimental demonstration of quantum key distribution without monitoring of the signal disturbance , 2015, 1505.07884.
[347] D. Englund,et al. Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding , 2015 .
[348] Jun Zhang,et al. Advances in InGaAs/InP single-photon detector systems for quantum communication , 2015, Light: Science & Applications.
[349] Yong-Su Kim,et al. Plug-and-Play Measurement-Device-Independent Quantum Key Distribution , 2015, 1501.03344.
[350] Hoi-Kwong Lo,et al. Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.
[351] H. Weinfurter,et al. Design and Evaluation of a Handheld Quantum Key Distribution Sender module , 2015, IEEE Journal of Selected Topics in Quantum Electronics.
[352] Zhu Cao,et al. Quantum random number generation , 2015, npj Quantum Information.
[353] Masato Koashi,et al. Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.
[354] Bing Qi,et al. Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection , 2015, 1503.00662.
[355] Shihan Sajeed,et al. Testing Random-Detector-Efficiency Countermeasure in a Commercial System Reveals a Breakable Unrealistic Assumption , 2016, IEEE Journal of Quantum Electronics.
[356] Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices , 2016, J. ACM.
[357] Peng Huang,et al. Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.
[358] Romain All'eaume,et al. Self-coherent phase reference sharing for continuous-variable quantum key distribution , 2016, 1605.03642.
[359] Raman Kashyap,et al. Creation of backdoors in quantum communications via laser damage , 2015, 1510.03148.
[360] Patrick J. Coles,et al. Numerical approach for unstructured quantum key distribution , 2015, Nature Communications.
[361] Wesley D. Sacher,et al. Silicon photonic transmitter for polarization-encoded quantum key distribution , 2016 .
[362] Jian-Wei Pan,et al. An efficient quantum light–matter interface with sub-second lifetime , 2015, Nature Photonics.
[363] Vladyslav C. Usenko,et al. Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense , 2016, Entropy.
[364] Masahide Sasaki,et al. Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system. , 2016, Optics letters.
[365] Félix Bussières,et al. 24-Hour Relativistic Bit Commitment. , 2016, Physical review letters.
[366] J. F. Dynes,et al. Directly Phase-Modulated Light Source , 2016, Physical Review X.
[367] Seth Lloyd,et al. Quantum enigma machine: Experimentally demonstrating quantum data locking. , 2016, Physical review. A.
[368] Tao Wang,et al. Field demonstration of a continuous-variable quantum key distribution network. , 2016, Optics letters.
[369] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[370] Horace P. Yuen,et al. Security of Quantum Key Distribution , 2016, IEEE Access.
[371] Adeline Orieux,et al. Recent advances on integrated quantum communications , 2016, 1606.07346.
[372] Bing Qi,et al. Practical challenges in quantum key distribution , 2016, npj Quantum Information.
[373] Masahide Sasaki,et al. Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.
[374] Marco Lucamarini,et al. Decoy-state quantum key distribution with a leaky source , 2016, New Journal of Physics.
[375] Hao Qin,et al. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution , 2015, 1511.01007.
[376] R. Boyd,et al. High-dimensional intracity quantum cryptography with structured photons , 2016, 1612.05195.
[377] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.
[378] Joseph Fitzsimons,et al. Private quantum computation: an introduction to blind quantum computing and related protocols , 2016, npj Quantum Information.
[379] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[380] Christian Schaffner,et al. Quantum cryptography beyond quantum key distribution , 2015, Designs, Codes and Cryptography.
[381] Feihu Xu,et al. Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution , 2016, 1609.02648.
[382] James F. Dynes,et al. Ultra-high bandwidth quantum secured data transmission , 2016, Scientific Reports.
[383] Zhu Cao,et al. Experimental quantum data locking , 2016 .
[384] Leif Katsuo Oxenløwe,et al. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits , 2016, npj Quantum Information.
[385] V. Dunjko,et al. Experimental demonstration of kilometer-range quantum digital signatures , 2015, 1509.07827.
[386] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[387] Wei Chen,et al. Experimental round-robin differential phase-shift quantum key distribution , 2015, 1505.08142.
[388] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[389] Yang Li,et al. Long-distance free-space quantum key distribution in daylight towards inter-satellite communication , 2017, Nature Photonics.
[390] D. Trotter,et al. Metropolitan quantum key distribution with silicon photonics , 2017, 1708.00434.
[391] Yang Liu,et al. Experimental measurement-device-independent quantum digital signatures over a metropolitan network , 2017, 1703.01021.
[392] Ning Wang,et al. Imperfect state preparation in continuous-variable quantum key distribution , 2017 .
[393] Qiang Zhou,et al. A cost-effective measurement-device-independent quantum key distribution system for quantum networks , 2017, 1702.05155.
[394] C. M. Natarajan,et al. Chip-based quantum key distribution , 2015, Nature Communications.
[395] Anthony Leverrier,et al. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.
[396] Miguel Herrero-Collantes,et al. Quantum random number generators , 2016, 1604.03304.
[397] H. Weinfurter,et al. Event-Ready Bell Test Using Entangled Atoms Simultaneously Closing Detection and Locality Loopholes. , 2016, Physical review letters.
[398] Andrew J. Shields,et al. Long-distance quantum key distribution secure against coherent attacks , 2017 .
[399] Jian-Wei Pan,et al. Long-distance copropagation of quantum key distribution and terabit classical optical data channels , 2016, 1610.04475.
[400] G. Vallone,et al. High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers , 2016, 1610.01682.
[401] Masoud Mohseni,et al. Commercialize quantum technologies in five years , 2017, Nature.
[402] Xiongfeng Ma,et al. Experimental Blind Quantum Computing for a Classical Client. , 2017, Physical review letters.
[403] Daniel J Gauthier,et al. Provably secure and high-rate quantum key distribution with time-bin qudits , 2017, Science Advances.
[404] J F Dynes,et al. Experimental measurement-device-independent quantum digital signatures , 2017, Nature Communications.
[405] J. E. Kennard,et al. Integrated silicon photonics for high-speed quantum key distribution , 2016, 2017 Conference on Lasers and Electro-Optics (CLEO).
[406] Yongmei Huang,et al. Satellite-to-ground quantum key distribution , 2017, Nature.
[407] C. Marquardt,et al. Free-space quantum links under diverse weather conditions , 2017, 1707.04932.
[408] A. W. Sharpe,et al. Best-Practice Criteria for Practical Security of Self-Differencing Avalanche Photodiode Detectors in Quantum Key Distribution , 2017, 1712.06520.
[409] Sebastian Kleis,et al. Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals. , 2017, Optics letters.
[410] G. Guo,et al. Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .
[411] Xiongfeng Ma,et al. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems , 2016, 1611.02524.
[412] Patrick J. Coles,et al. Entropic uncertainty relations and their applications , 2015, 1511.04857.
[413] Hong Cai,et al. Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution. , 2017, Optics express.
[414] Hui Liu,et al. Experimental quantum digital signature over 102 km , 2016, 1608.01086.
[415] Feihu Xu,et al. Quantum-memory-assisted multi-photon generation for efficient quantum information processing , 2017, 1704.00879.
[416] Rong Wang,et al. Improved security bound for the round-robin-differential-phase-shift quantum key distribution , 2018, Nature Communications.
[417] J. F. Dynes,et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.
[418] Marcos Curty,et al. Finite-key security analysis for quantum key distribution with leaky sources , 2018, New Journal of Physics.
[419] S. Pirandola,et al. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.
[420] Marco Lucamarini,et al. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound , 2018, 1805.05511.
[421] Kunchi Peng,et al. Long-Distance Continuous-Variable Quantum Key Distribution with Entangled States , 2018, Physical Review Applied.
[422] Hoi-Kwong Lo,et al. Enabling a Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Network , 2018 .
[423] Christian Weedbrook,et al. Security proof of continuous-variable quantum key distribution using three coherent states , 2017, 1709.01758.
[424] Shuang Wang,et al. Hacking the Quantum Key Distribution System by Exploiting the Avalanche-Transition Region of Single-Photon Detectors , 2018, Physical Review Applied.
[425] Jian-Wei Pan,et al. Satellite-Relayed Intercontinental Quantum Network. , 2018, Physical review letters.
[426] F. Bussières,et al. Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.
[427] Rupesh Kumar,et al. Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.
[428] Paolo Villoresi,et al. Space QUEST mission proposal: experimentally testing decoherence due to gravity , 2017, New Journal of Physics.
[429] Qiang Zhang,et al. Large scale quantum key distribution: challenges and solutions [Invited]. , 2018, Optics express.
[430] Philip Walther,et al. Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.
[431] Marco Lucamarini,et al. 10-Mb/s Quantum Key Distribution , 2018, Journal of Lightwave Technology.
[432] Xiongfeng Ma,et al. Phase-Matching Quantum Key Distribution , 2018, Physical Review X.
[433] Yang Liu,et al. Device-independent quantum random-number generation , 2018, Nature.
[434] Xiongfeng Ma,et al. One-Shot Coherence Dilution. , 2017, Physical review letters.
[435] Quantum Communications and Cryptography , 2018 .
[436] V. Makarov,et al. Quantum key distribution with distinguishable decoy states , 2017, Physical Review A.
[437] Z. L. Yuan,et al. A direct GHz-clocked phase and intensity modulated transmitter applied to quantum key distribution. , 2018 .
[438] Jie Lin,et al. Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.
[439] Haiqiang Ma,et al. Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration , 2018, Optica.
[440] Zong-Wen Yu,et al. Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.
[441] Norbert Lütkenhaus,et al. Eavesdropping and countermeasures for backflash side channel in quantum cryptography. , 2018, Optics express.
[442] Qiang Zhang,et al. Integrating quantum key distribution with classical communications in backbone fiber network. , 2017, Optics express.
[443] Masato Koashi,et al. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses , 2018 .
[444] Patrick J. Coles,et al. Reliable numerical key rates for quantum key distribution , 2017, Quantum.
[445] S. Wehner,et al. Quantum internet: A vision for the road ahead , 2018, Science.
[446] Tao Wang,et al. High key rate continuous-variable quantum key distribution with a real local oscillator. , 2018, Optics express.
[447] Guihua Zeng,et al. Feasibility of All-Day Quantum Communication with Coherent Detection , 2019, Physical Review Applied.
[448] John C. Platt,et al. Quantum supremacy using a programmable superconducting processor , 2019, Nature.
[449] J. F. Dynes,et al. Cambridge quantum network , 2019, npj Quantum Information.
[450] Li Li,et al. Experimental quantum repeater without quantum memory , 2019, Nature Photonics.
[451] Qiang Zhang,et al. Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.
[452] S Wehner,et al. Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.
[453] Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution , 2019, Physical Review X.
[454] Rong Wang,et al. Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.
[455] Vadim Makarov,et al. Laser-seeding Attack in Quantum Key Distribution , 2019, Physical Review Applied.
[456] M. Peev,et al. Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator , 2017, Quantum.
[457] Mei Li,et al. Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.
[458] Hoi-Kwong Lo,et al. Simple security proof of twin-field type quantum key distribution protocol , 2018, npj Quantum Information.
[459] Xiongfeng Ma,et al. Symmetry-Protected Privacy: Beating the Rate-Distance Linear Bound Over a Noisy Channel , 2019, Physical Review Applied.
[460] Hoi-Kwong Lo,et al. Foiling covert channels and malicious classical post-processing units in quantum key distribution , 2017, npj Quantum Information.
[461] Hao Li,et al. Surpassing the rate-transmittance linear bound of quantum key distribution , 2019, 1908.01271.
[462] Xiongfeng Ma,et al. Operational interpretation of coherence in quantum key distribution , 2018, Physical Review A.
[463] Marco Lucamarini,et al. Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.
[464] Leif Katsuo Oxenløwe,et al. Orbital Angular Momentum States Enabling Fiber-based High-dimensional Quantum Communication , 2018, Physical Review Applied.
[465] Anthony Leverrier,et al. Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation , 2019, Physical Review X.
[466] Feihu Xu,et al. Implementation security of quantum key distribution due to polarization-dependent efficiency mismatch , 2019, Physical Review A.
[467] Yasushi Hasegawa,et al. Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters , 2019, Nature Communications.
[468] Hoi-Kwong Lo,et al. Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks , 2018, Physical Review X.
[469] Wee Ser,et al. An integrated silicon photonic chip platform for continuous-variable quantum key distribution , 2019, Nature Photonics.
[470] Thomas Roger,et al. A modulator-free quantum key distribution transmitter chip , 2019, npj Quantum Information.
[471] Antonios Varvitsiotis,et al. Characterising the correlations of prepare-and-measure quantum networks , 2018, npj Quantum Information.
[472] Hao Li,et al. Remote Blind State Preparation with Weak Coherent Pulses in the Field. , 2019, Physical review letters.
[473] Jian-Wei Pan,et al. Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels. , 2018, Physical review letters.
[474] N. Lutkenhaus,et al. Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence , 2019, Physical Review A.
[475] Masato Koashi,et al. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit , 2019, Nature Communications.
[476] B. Gopinath,et al. THE BELL SYSTEM , 2019 .
[477] Shuang Wang,et al. Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.
[478] Li Qian,et al. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.
[479] Jun Gao,et al. Hacking Quantum Key Distribution via Injection Locking , 2019, Physical Review Applied.
[480] Hong Guo,et al. Long-distance continuous-variable quantum key distribution over 202.81 km fiber , 2020, 2001.02555.
[481] Gustavo Lima,et al. Quantum information processing with space-division multiplexing optical fibres , 2019, Communications Physics.
[482] Jian-Wei Pan,et al. Entanglement of two quantum memories via fibres over dozens of kilometres , 2020, Nature.
[483] Renato Renner,et al. Advantage Distillation for Device-Independent Quantum Key Distribution. , 2019, Physical review letters.
[484] H. Lo,et al. Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses , 2020, npj Quantum Information.
[485] Jian-Wei Pan,et al. Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. , 2019, Physical review letters.
[486] S. Guha,et al. Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution , 2019, Physical Review A.