Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution
暂无分享,去创建一个
Xiu-Bo Chen | Jian Li | Yu-Guang Yang | Wei-Min Shi | Yi-Hua Zhou | Yuguang Yang | Yihua Zhou | Xiubo Chen | Jian Li | Wei-Min shi
[1] Xiubo Chen,et al. Novel classical post-processing for quantum key distribution-based quantum private query , 2016, Quantum Inf. Process..
[2] Zhu Cao,et al. Experimental passive round-robin differential phase-shift quantum key distribution. , 2015, Physical review letters.
[3] Tang Chao-jing,et al. Multi-Bit Quantum Private Query , 2015 .
[4] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[5] Fang Yu,et al. Coding-based quantum private database query using entanglement , 2014, Quantum Inf. Comput..
[6] Chuan Wang,et al. Implementation of Quantum Private Queries Using Nuclear Magnetic Resonance , 2011 .
[7] Seth Lloyd,et al. Quantum private queries. , 2007, Physical review letters.
[8] Yu-Guang Yang,et al. Secure quantum private query with real-time security check , 2014 .
[9] Seth Lloyd,et al. Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.
[10] Fei Gao,et al. Private database queries based on counterfactual quantum key distribution , 2013 .
[11] Li Zhang,et al. Private Database Queries Using Quantum States with Limited Coherence Times , 2007, 0709.4502.
[12] Mehmet A. Orgun,et al. Controllable quantum private queries using an entangled Fibonacci-sequence spiral source , 2015 .
[13] Fei Gao,et al. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol , 2014, Scientific Reports.
[14] Peng Xu,et al. Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..
[15] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[16] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[17] Hui Chen,et al. Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.
[18] Christoph Simon,et al. Performing private database queries in a real-world environment using a quantum protocol , 2013, Scientific Reports.
[19] S. Lloyd,et al. Experimental quantum private queries with linear optics , 2009 .
[20] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[21] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[22] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[23] Josef Pieprzyk,et al. Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing , 2018, Laser Physics Letters.
[24] Ronald de Wolf,et al. Quantum symmetrically-private information retrieval , 2003, Inf. Process. Lett..
[25] Yoshihisa Yamamoto,et al. Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.
[26] Yu-Guang Yang,et al. Relativistic quantum private database queries , 2015, Quantum Information Processing.
[27] Fei Gao,et al. Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[28] M. V. Panduranga Rao,et al. Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.
[29] 王剑,et al. Multi-Bit Quantum Private Query , 2015 .
[30] Lukasz Olejnik,et al. Secure quantum private information retrieval using phase-encoded queries , 2011 .
[31] Bin Liu,et al. QKD-based quantum private query without a failure probability , 2015, 1511.05267.
[32] Rui Yang,et al. Private database queries using one quantum state , 2015, Quantum Inf. Process..