Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography
暂无分享,去创建一个
[1] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[2] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[3] Norbert Lütkenhaus,et al. Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography , 2007, Quantum Inf. Comput..
[4] Hoi-Kwong Lo,et al. Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states , 2007, Quantum Inf. Comput..
[5] Toyohiro Tsurumaru. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol , 2007 .
[6] Yoshihisa Yamamoto,et al. Differential-phase-shift quantum key distribution using coherent light , 2003 .
[7] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[8] Yoshihisa Yamamoto,et al. Differential phase shift quantum key distribution. , 2002 .
[9] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[10] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[11] Andrew G. Glen,et al. APPL , 2001 .
[12] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] Nicolas Cerf,et al. From quantum cloning to quantum key distribution with continuous variables: a review (Invited) , 2007 .
[15] Yoshihisa Yamamoto,et al. Security of differential-phase-shift quantum key distribution against individual attacks , 2005, quant-ph/0508112.
[16] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[17] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[18] Differential-phase-shift quantum key distribution with an extended degree of freedom. , 2006, Optics letters.
[19] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[20] V. Scarani,et al. Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.
[21] R. Renner. Symmetry of large physical systems implies independence of subsystems , 2007 .
[22] Kyo Inoue,et al. Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack , 2005 .
[23] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[24] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[25] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[26] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[27] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.