Access the full text.
Sign up today, get DeepDyve free for 14 days.
H-K Lo, X Ma, K Chen (2005)
Decoy state quantum key distributionPhys. Rev. Lett., 94
Masahide Sasaki, Osamu Hirota (1996)
Optimum decision scheme with a unitary control process for binary quantum-state signals.Physical review. A, Atomic, molecular, and optical physics, 54 4
S. Croke, E. Andersson, S. Barnett, C. Gilson, J. Jeffers (2006)
Maximum confidence quantum measurements.Physical review letters, 96 7
V. Scarani, A. Acín, G. Ribordy, N. Gisin (2002)
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.Physical review letters, 92 5
H. Yuen, R. Kennedy, M. Lax (1975)
Optimum testing of multiple hypotheses in quantum detection theoryIEEE Trans. Inf. Theory, 21
Xiang-Bin Wang (2004)
Beating the PNS attack in practical quantum cryptography
Christian Monyk (2019)
Quantum CryptographyFoundations of Physics, 40
H. Bechmann-Pasquinucci, A. Peres (2000)
Quantum cryptography with 3-state systems.Physical review letters, 85 15
(2013)
Quantum-key-distribution protocols without sifting that are resistant to photon-number-splitting attacks
V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev (2008)
The security of practical quantum key distributionReviews of Modern Physics, 81
Yuan Li, Wansu Bao, Hongwei Li, Chun Zhou, Yang Wang (2013)
Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuationsPhysical Review A, 89
Sonja Franke-Arnold, John Jeffers (2012)
Unambiguous state discrimination in high dimensionsThe European Physical Journal D, 66
B. Huttner, A. Muller, J. Gautier, H. Zbinden, N. Gisin (1996)
Unambiguous quantum measurement of nonorthogonal states.Physical review. A, Atomic, molecular, and optical physics, 54 5
O. Jim'enez, M. Sol'is-Prosser, A. Delgado, Leonardo Neves (2011)
Maximum-confidence discrimination among symmetric qudit statesPhysical Review A, 84
H. Lo, M. Curty, B. Qi (2011)
Measurement-device-independent quantum key distribution.Physical review letters, 108 13
B. Huttner, N. Imoto, N. Gisin, T. Mor (1995)
Quantum cryptography with coherent statesTechnical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
Hongxin Ma, Peng Huang, Dongyun Bai, Shiyu Wang, Wansu Bao, Guihua Zeng (2017)
Continuous-variable measurement-device-independent quantum key distribution with photon subtractionPhysical Review A, 97
K. Marshall, C. Weedbrook (2014)
Device-independent quantum cryptography for continuous variablesPhysical Review A, 90
(1984)
In: Proceedings of IEEE International Conference on Computers
Z Li, Y-C Zhang, F Xu, X Peng, H Guo (2014)
Continuous-variable measurement-device-independent quantum key distributionPhys. Rev. A, 89
S. Phoenix, S. Barnett, A. Chefles (2000)
Three-state quantum cryptographyJournal of Modern Optics, 47
M. Dušek, M. Jahma, N. Lutkenhaus (1999)
Unambiguous state discrimination in quantum cryptography with weak coherent statesPhysical Review A, 62
Feihu Xu, He Xu, H. Lo (2014)
Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distributionPhysical Review A, 89
X-B Wang (2005)
Beating the photon-number-splitting attack in practical quantum cryptographyPhys. Rev. Lett., 94
Xiongfeng Ma, H. Lo, Yi Zhao, B. Qi (2005)
Practical decoy state for quantum key distribution (15 pages)Physical Review A, 72
R. Clarke, A. Chefles, S. Barnett, E. Riis (2000)
Experimental demonstration of optimal unambiguous state discriminationPhysical Review A, 63
Pei Zhang, Pei Zhang, K. Aungskunsiri, E. Martin-Lopez, E. Martin-Lopez, J. Wabnig, M. Lobino, M. Lobino, R. Nock, J. Munns, D. Bonneau, D. Bonneau, P. Jiang, Hongwei Li, A. Laing, A. Laing, J. Rarity, A. Niskanen, M. Thompson, Jeremy O'Brien (2013)
Reference-frame-independent quantum-key-distribution server with a telecom tether for an on-chip client.Physical review letters, 112 13
W. Hwang (2002)
Quantum key distribution with high loss: toward global secure communication.Physical review letters, 91 5
R. Clarke, V. Kendon, A. Chefles, S. Barnett, E. Riis, M. Sasaki (2000)
Experimental realization of optimal detection strategies for overcomplete statesPhysical Review A, 64
A. Laing, V. Scarani, J. Rarity, J. O'Brien (2010)
Reference-frame-independent quantum key distributionPhysical Review A, 82
J. Wabnig, D. Bitauld, Hongwei Li, A. Laing, J. O'Brien, A. Niskanen (2013)
Demonstration of free-space reference frame independent quantum key distributionNew Journal of Physics, 15
Vibha Ojha, Anand Sharma, V. Goar, P. Trivedi (2011)
Limitations of Practical Quantum Cryptography
M. Ban, K. Kurokawa, R. Momose, O. Hirota (1997)
Optimum measurements for discrimination among symmetric quantum states and parameter estimationInternational Journal of Theoretical Physics, 36
N Gisin, G Ribordy, W Tittel, H Zbinden (2002)
Quantum cryptographyRev. Mod. Phys., 74
S. Croke, S. Croke, P. Mosley, S. Barnett, I. Walmsley (2007)
Maximum confidence measurements and their optical implementationThe European Physical Journal D, 41
F. Grosshans, P. Grangier (2001)
Continuous variable quantum cryptography using coherent states.Physical review letters, 88 5
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
M. Sasaki, S. Barnett, R. Jozsa, M. Osaki, Osamu Laboratory, U. Strathclyde, U. Plymouth, Tamagawa University (1998)
Accessible information and optimal strategies for real symmetrical quantum sourcesPhysical Review A, 59
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
X Ma, B Qi, Y Zhao, H-K Lo (2005)
Practical decoy state for quantum key distributionPhys. Rev. A, 72
Sellami Ali (2010)
DECOY STATE QUANTUM KEY DISTRIBUTIONIIUM Engineering Journal, 10
S. Barnett, S. Croke (2008)
Quantum state discriminationAdvances in Optics and Photonics, 1
Yang Lu, N. Coish, R. Kaltenbaek, D. Hamel, S. Croke, K. Resch (2010)
Minimum-error discrimination of entangled quantum statesPhysical Review A, 82
N. Lutkenhaus (1999)
Security against individual attacks for realistic quantum key distribution
We propose a four-state quantum key distribution (QKD) scheme using generalized measurement of nonorthogonal states, the maximum mutual information measurement strategy. Then, we analyze the eavesdropping process in intercept–resend and photon number splitting attack scenes. Our analysis shows that in the intercept–resend and photon number splitting attack eavesdropping scenes, our scheme is more secure than BB84 protocol and has higher key generation rate which may be applied to high-density QKD.
Quantum Information Processing – Springer Journals
Published: Nov 20, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.