Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels.
暂无分享,去创建一个
Jian-Wei Pan | Feihu Xu | H. Lo | Teng-Yun Chen | Hui Liu | L. You | Zhen Wang | Hao Liang | Nai-Le Liu | Li Li | Kejin Wei | Wenyuan Wang | Xiaotian Fang | Sijie Zhang | Weijun Zhang | Hao Li | Xiao-Tian Fang | Teng-Yun Chen
[1] Hong,et al. Measurement of subpicosecond time intervals between two photons by interference. , 1987, Physical review letters.
[2] Physical Review Letters 63 , 1989 .
[3] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[4] E. Andersson,et al. Experimentally realizable quantum comparison of coherent states and its applications , 2006, quant-ph/0601130.
[5] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[6] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[7] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[8] Feihu Xu,et al. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.
[9] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[10] Kai Chen,et al. Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.
[11] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[12] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[13] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[14] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[15] Stefano Pirandola,et al. Side-channel-free quantum key distribution. , 2011, Physical review letters.
[16] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[17] Chun-Mei Zhang,et al. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .
[18] Xiang‐Bin Wang,et al. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.
[19] T. F. D. Silva,et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.
[20] I Lucio-Martinez,et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.
[21] Feihu Xu,et al. Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.
[22] M. Fejer,et al. Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.
[23] Jian-Wei Pan,et al. Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.
[24] Li Qian,et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.
[25] Feihu Xu,et al. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.
[26] Juan Miguel Arrazola,et al. Quantum fingerprinting with coherent states and a constant mean number of photons , 2013, 1309.5005.
[27] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[28] Shuang Wang,et al. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.
[29] Yang Liu,et al. Measurement-device-independent quantum key distribution over untrustful metropolitan network , 2015, 1509.08389.
[30] Juan Miguel Arrazola,et al. Experimental quantum fingerprinting with weak coherent pulses , 2015, Nature Communications.
[31] Feihu Xu,et al. Observation of Quantum Fingerprinting Beating the Classical Limit. , 2016, Physical review letters.
[32] Erika Andersson,et al. Measurement-device-independent quantum digital signatures , 2016 .
[33] R. Penty,et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.
[34] H. Lo,et al. Experimental measurement-device-independent quantum key distribution with imperfect sources , 2015, 1508.03562.
[35] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.
[36] Y.-H. Zhou,et al. Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.
[37] Yang Liu,et al. Experimental measurement-device-independent quantum digital signatures over a metropolitan network , 2017, 1703.01021.
[38] Zach DeVito,et al. Opt , 2017 .
[39] Dong He,et al. Satellite-based entanglement distribution over 1200 kilometers , 2017, Science.
[40] J F Dynes,et al. Experimental measurement-device-independent quantum digital signatures , 2017, Nature Communications.
[41] J. F. Dynes,et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.
[42] George Siopsis,et al. Experimental Study of Hong–Ou–Mandel Interference Using Independent Phase Randomized Weak Coherent States , 2018, Journal of Lightwave Technology.
[43] Ilgaitis Prūsis,et al. Nature of Photon , 2019 .
[44] Antonio-José Almeida,et al. NAT , 2019, Springer Reference Medizin.