A Simple Scheme for Realizing the Passive Decoy-State Quantum Key Distribution
暂无分享,去创建一个
Dong Wang | Qin Wang | Chun-Mei Zhang | Chun-Hui Zhang | Qin Wang | Chun-Hui Zhang | Dong Wang | Chunmei Zhang
[1] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[2] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[3] J. P. von der Weid,et al. Quantum random number generation enhanced by weak-coherent states interference. , 2016, Optics express.
[4] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[5] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[6] Guilherme P. Temporao,et al. Linear-optic heralded photon source , 2015 .
[7] T. Moroder,et al. Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.
[8] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[9] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[10] G. Guo,et al. Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .
[11] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[12] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[13] Zhu Cao,et al. Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.
[14] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[15] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[16] Hui Liu,et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.
[17] N. Gisin,et al. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.
[18] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[19] T. Moroder,et al. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.
[20] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[21] Jian-Wei Pan,et al. General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.
[22] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[23] Horace P. Yuen,et al. Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .
[24] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[25] Qin Wang,et al. Scheme for realizing passive quantum key distribution with heralded single-photon sources , 2016 .
[26] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[27] Shi-Hai Sun,et al. Experimental demonstration of passive-decoy-state quantum key distribution with two independent lasers , 2016 .
[28] Hoi-Kwong Lo,et al. Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.
[29] N. Imoto,et al. Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.
[30] P. A. Hiskett,et al. Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.
[31] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[32] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[33] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..