Continuous-variable source-device-independent quantum key distribution against general attacks
暂无分享,去创建一个
Hong Guo | Yi-Chen Zhang | Song Yu | Ziyang Chen | Christian Weedbrook | C. Weedbrook | Song Yu | Ziyang Chen | Hong Guo | Yichen Zhang
[1] Ziyang Chen,et al. Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks , 2018, Physical Review A.
[2] L. Banchi,et al. Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.
[3] P. Grangier,et al. Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.
[4] Eleni Diamanti,et al. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.
[5] Hong Guo,et al. Composable Security Analysis for Continuous Variable Measurement-Device-Independent Quantum Key Distribution , 2017 .
[6] Marco Tomamichel,et al. Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.
[7] Jiri Janousek,et al. Violation of Bell's Inequality Using Continuous Variable Measurements. , 2018, Physical review letters.
[8] Stefano Pirandola,et al. General immunity and superadditivity of two-way Gaussian quantum cryptography , 2016, Scientific Reports.
[9] I. G. Priest. The Optical Society of America , 1962, Nature.
[10] Stefano Pirandola,et al. High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.
[11] Hong Guo,et al. User-defined quantum key distribution , 2018, 1805.04249.
[12] J. Cirac,et al. Extremality of Gaussian quantum states. , 2005, Physical review letters.
[13] Christian Weedbrook,et al. Continuous-variable quantum key distribution with entanglement in the middle , 2012, 1205.1497.
[14] P. Grangier,et al. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation , 2011, Physical Review A.
[15] Xiang Peng,et al. Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.
[16] Stefano Mancini,et al. Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation , 2015 .
[17] S. Braunstein,et al. CV-MDI-QKD: One-mode Gaussian attacks are not enough , 2015, 1509.04144.
[18] Wanyi Gu,et al. Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.
[19] Vadim Makarov,et al. Implementation vulnerabilities in general quantum cryptography , 2018, New Journal of Physics.
[20] Raúl García-Patrón,et al. Continuous-variable quantum key distribution protocols over noisy channels. , 2008, Physical review letters.
[21] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[22] Mario Berta,et al. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .
[23] Anthony Leverrier,et al. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.
[24] Wee Ser,et al. An integrated silicon photonic chip platform for continuous-variable quantum key distribution , 2019, Nature Photonics.
[25] Christoph Pacher,et al. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks , 2014, Nature Communications.
[26] Anthony Leverrier,et al. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.
[27] Wanyi Gu,et al. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers , 2014 .
[28] N. Cerf,et al. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.
[29] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[30] A. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .
[31] Samuel L. Braunstein,et al. Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.
[32] F. Furrer,et al. Position-momentum uncertainty relations in the presence of quantum memory , 2013, 1308.4527.
[33] Fabian Furrer,et al. Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle , 2014, 1405.5965.
[34] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[35] Seth Lloyd,et al. Gaussian quantum information , 2011, 1110.3234.
[36] Tsuyoshi Murata,et al. {m , 1934, ACML.
[37] R. Renner,et al. Min- and Max-Entropy in Infinite Dimensions , 2010, 1004.1386.
[38] Stefano Pirandola,et al. Entanglement reactivation in separable environments , 2012, 1210.2119.
[39] Ericka Stricklin-Parker,et al. Ann , 2005 .
[40] Hong Guo,et al. Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution , 2019, Entropy.
[41] S. Pirandola,et al. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.
[42] Christian Weedbrook,et al. Quantum cryptography without switching. , 2004, Physical review letters.
[43] Hong Guo,et al. SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL , 2011, 1110.1818.
[44] Maxim Kuschnerov,et al. Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks , 2018, IEEE Photonics Technology Letters.
[45] R. F. Werner,et al. Maximal violation of Bell inequalities by position measurements , 2009, 0912.3740.
[46] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[47] Nathan Walk,et al. Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution , 2014, 1405.6593.
[48] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[49] Reinhard F. Werner,et al. Gaussian entanglement for quantum key distribution from a single-mode squeezing source , 2011, 1110.3977.
[50] Anthony Leverrier,et al. Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.
[51] Mei Li,et al. Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.
[52] R. Serfling. Probability Inequalities for the Sum in Sampling without Replacement , 1974 .
[53] Hong Guo,et al. Long-distance continuous-variable quantum key distribution over 202.81 km fiber , 2020, 2001.02555.
[54] Seth Lloyd,et al. Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.
[55] Hong Guo,et al. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation , 2017, 1703.02727.
[56] Naoya Wada,et al. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels , 2019, Communications Physics.