Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses
暂无分享,去创建一个
Cong Jiang | Zong-Wen Yu | Xiang-Bin Wang | Xiao-Long Hu | Zong-Wen Yu | Xiao-Long Hu | C. Jiang | Xiang-Bin Wang
[1] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[2] Xiongfeng Ma,et al. Phase-Matching Quantum Key Distribution , 2018, Physical Review X.
[3] Wei Chen,et al. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system , 2009 .
[4] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[5] Xiang‐Bin Wang,et al. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.
[6] S. Guha,et al. Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.
[7] Zong-Wen Yu,et al. Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.
[8] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[9] Rong Wang,et al. Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.
[10] Marco Tomamichel,et al. Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.
[11] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[12] Yoshihisa Yamamoto,et al. Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.
[13] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[14] James F. Dynes,et al. A quantum access network , 2013, Nature.
[15] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[16] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[17] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[18] Marco Lucamarini,et al. Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.
[19] Hai Xu,et al. qu an tph ] 2 5 Ju l 2 01 8 Sending-or-not twin-field quantum key distribution in practice , 2018 .
[20] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[21] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[22] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[23] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[24] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[25] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[26] Ueli Maurer,et al. Small accessible quantum information does not imply security. , 2007, Physical review letters.
[27] F. Bussières,et al. Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.
[28] Masato Koashi,et al. Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.
[29] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[30] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[31] Jian-Wei Pan,et al. Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.
[32] H. Weinfurter,et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.
[33] Xiang-Bin Wang. A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .
[34] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[35] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.
[36] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[37] Tao Zhang,et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.
[38] Shuang Wang,et al. Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.
[39] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[40] B Kraus,et al. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.
[41] Kai Chen,et al. Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.
[42] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[43] Cheng-Zhi Peng,et al. Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source , 2007 .
[44] N. Lutkenhaus,et al. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.
[45] Xingyu Zhou,et al. Asymmetric sending or not sending twin-field quantum key distribution in practice , 2019, Physical Review A.
[46] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[47] Marco Tomamichel,et al. Chain Rules for Smooth Min- and Max-Entropies , 2012, IEEE Transactions on Information Theory.
[48] C. G. Peterson,et al. Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.
[49] Jörn Müller-Quade,et al. Composability in quantum cryptography , 2009, ArXiv.
[50] Shuang Wang,et al. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.
[51] Nicolas Gisin,et al. Quantum communication , 2017, 2017 Optical Fiber Communications Conference and Exhibition (OFC).
[52] Xiang‐Bin Wang,et al. Reexamination of decoy-state quantum key distribution with biased bases , 2016 .
[53] G. Guo,et al. Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .
[54] Feihu Xu,et al. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.
[55] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[56] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[57] H. Chernoff. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .
[58] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[59] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[60] M. Hayashi,et al. Quantum information with Gaussian states , 2007, 0801.4604.
[61] Horace P. Yuen,et al. Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .
[62] Cong Jiang,et al. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation , 2017, 1710.08211.
[63] J. F. Dynes,et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.
[64] Marcos Curty,et al. Practical decoy-state method for twin-field quantum key distribution , 2019, New Journal of Physics.
[65] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[66] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[67] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[68] H. Chau. Decoy-state quantum key distribution with more than three types of photon intensity pulses , 2017, 1712.00727.
[69] J. F. Dynes,et al. Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters , 2018 .
[70] Hai Xu,et al. Sending-or-not-sending twin-field quantum key distribution in practice , 2018, Scientific Reports.
[71] Chun-Mei Zhang,et al. Twin-field quantum key distribution with modified coherent states. , 2019, Optics letters.
[72] Yongmei Huang,et al. Satellite-to-ground quantum key distribution , 2017, Nature.
[73] M. Hayashi. Upper bounds of eavesdropper’s performances in finite-length code with the decoy method , 2007, quant-ph/0702250.
[74] L. Banchi,et al. Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.
[75] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[76] Jian-Wei Pan,et al. General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.
[77] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[78] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[79] Hoi-Kwong Lo,et al. Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.