Quantum relay schemes for continuous-variable quantum key distribution

[1]  Frédéric Grosshans Collective attacks and unconditional security in continuous variable quantum key distribution. , 2005, Physical review letters.

[2]  N. Gisin,et al.  Long distance quantum teleportation in quantum relay configuration , 2003, 2003 European Quantum Electronics Conference. EQEC 2003 (IEEE Cat No.03TH8665).

[3]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[4]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[5]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[6]  Miguel Navascués,et al.  Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.

[7]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[8]  Romain Alléaume,et al.  Multidimensional reconciliation for continuous-variable quantum key distribution , 2007, 2008 IEEE International Symposium on Information Theory.

[9]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[10]  N. Gisin,et al.  Quantum relays for long distance quantum cryptography , 2003, quant-ph/0311101.

[11]  Bing Qi,et al.  Discrete and continuous variables for measurement-device-independent quantum cryptography , 2015, Nature Photonics.

[12]  E. Diamanti,et al.  Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers , 2008, 0812.4314.

[13]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[14]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[15]  Zheng-Fu Han,et al.  Detection efficiency and noise in a semi-device-independent randomness-extraction protocol , 2015, 1502.01495.

[16]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[17]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[18]  S. Braunstein,et al.  Quantum Information with Continuous Variables , 2004, quant-ph/0410100.