Access the full text.
Sign up today, get DeepDyve free for 14 days.
HK Lo, XF Ma, K Chen (2005)
Decoy state quantum key distributionPhys. Rev. Lett., 94
C. Fung, B. Qi, K. Tamaki, H. Lo (2006)
Phase-Remapping Attack in Practical Quantum Key Distribution SystemsArXiv, abs/quant-ph/0601115
(1984)
Unconditional security of quantumkeydistributionover arbitrarily longdistances
Xiang-Bin Wang (2004)
Beating the PNS attack in practical quantum cryptography
yan-lin tang, Hua-Lei Yin, Sijing Chen, Yang Liu, Wei-Jun Zhang, Xiao Jiang, Lu Zhang, Jian Wang, L. You, Jian-Yu Guan, Dong-xu Yang, Zhen Wang, Hao Liang, Zhen Zhang, Nan Zhou, Xiongfeng Ma, Teng-Yun Chen, Qiang Zhang, Jian-Wei Pan (2014)
Measurement-device-independent quantum key distribution over 200 km.Physical review letters, 113 19
D. Mayers (1998)
Unconditional security in quantum cryptographyJ. ACM, 48
HK Lo, M Curty, B Qi (2012)
Measurement-device-independent quantum key distributionPhys. Rev. Lett., 108
Yi Zhao, B. Qi, Xiongfeng Ma, H. Lo, L. Qian (2005)
Experimental quantum key distribution with decoy states.Physical review letters, 96 7
P. Shor, J. Preskill (2000)
Simple proof of security of the BB84 quantum key distribution protocolPhysical review letters, 85 2
S. Braunstein, S. Pirandola (2011)
Side-channel-free quantum key distribution.Physical review letters, 108 13
H. Lo, M. Curty, B. Qi (2012)
14 73 v 2 [ qu an tph ] 2 8 M ay 2 01 2 Measurement device independent quantum key distribution
Qin Wang, Xiang-Bin Wang (2013)
Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sourcesPhysical Review A, 88
B. Qi, C. Fung, H. Lo, Xiongfeng Ma (2005)
Time-shift attack in practical quantum cryptosystemsQuantum Inf. Comput., 7
K. Tamaki, H. Lo, C. Fung, B. Qi (2011)
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flawPhysical Review A, 85
XB Wang (2005)
Beating the photon-number-splitting attack in practical quantum cryptographyPhys. Rev. Lett., 94
Xiongfeng Ma, H. Lo, Yi Zhao, B. Qi (2005)
Practical decoy state for quantum key distribution (15 pages)Physical Review A, 72
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, V. Makarov (2010)
Hacking commercial quantum cryptography systems by tailored bright illuminationNature Photonics, 4
Yiheng Zhou, Zong-Wen Yu, Xiang-Bin Wang (2014)
Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%Physical Review A, 89
W. Hwang (2002)
Quantum key distribution with high loss: toward global secure communication.Physical review letters, 91 5
Xiang-Bin Wang (2008)
A decoy-state protocol for quantum cryptography with 4 intensities of coherent states
Vibha Ojha, Anand Sharma, V. Goar, P. Trivedi (2011)
Limitations of Practical Quantum Cryptography
A. Acín, N. Brunner, N. Gisin, S. Massar, Stefano Pironio, V. Scarani (2007)
Device-independent security of quantum cryptography against collective attacks.Physical review letters, 98 23
Q Wang, XB Wang, GC Guo (2007)
Practical decoy state for quantum key distributionPhys. Rev. A, 75
Sellami Ali (2010)
DECOY STATE QUANTUM KEY DISTRIBUTIONIIUM Engineering Journal, 10
C. Branciard, E. Cavalcanti, S. Walborn, V. Scarani, H. Wiseman (2011)
One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steeringPhysical Review A, 85
XB Wang (2005)
Decoy-state protocol for quantum cryptography with four different intensities of coherent lightPhys. Rev. A., 72
Qin Wang, Xiang-Bin Wang, G. Guo (2006)
Practical decoy-state method in quantum key distribution with a heralded single-photon sourcePhysical Review A, 75
W. Mauerer, C. Silberhorn (2006)
Quantum key distribution with passive decoy state selectionPhysical Review A, 75
N. Lütkenhaus, M. Jahma (2001)
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attackNew Journal of Physics, 4
Chun Zhou, Wansu Bao, Wei Chen, Hongwei Li, Z. Yin, Yang Wang, Z. Han (2013)
Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sourcesPhysical Review A, 88
N. Lutkenhaus (1999)
Security against individual attacks for realistic quantum key distribution
N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, V. Makarov, G. Leuchs (2011)
Device calibration impacts security of quantum key distribution.Physical review letters, 107 11
M. Curty, Xiongfeng Ma, B. Qi, T. Moroder (2009)
Passive decoy-state quantum key distribution with practical light sourcesPhysical Review A, 81
(1984)
Quantum cryptography: public key distribution and coin tossing
In this paper, we propose a new scheme on implementing the quantum key distribution with two-intensity weak coherent light and compare its performance with other existing methods. Through numerical simulations, we demonstrate that our new scheme can exceed almost all other existing decoy-state methods, e.g., the standard three-intensity decoy-state method and the usual passive decoy-state method, both in the transmission distance and in the final key generation rate, approaching very closely to the ideal case of using an infinite number of decoy states. Besides, we also consider the finite-size key effect. We demonstrate that under current experimental conditions, even when taking statistical fluctuation into account, a quite high key generation rate can still be obtained at very long transmission distance by applying our new scheme.
Quantum Information Processing – Springer Journals
Published: Jul 29, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.