4.6 Article

Finite-key analysis for one-sided device-independent quantum key distribution

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

One-Shot Classical Data Compression With Quantum Side Information and the Distillation of Common Randomness or Secret Keys

Joseph M. Renes et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2012)

Article Physics, Multidisciplinary

Loophole-free Einstein-Podolsky-Rosen experiment via quantum steering

Bernhard Wittmann et al.

NEW JOURNAL OF PHYSICS (2012)

Article Physics, Multidisciplinary

Measurement-Device-Independent Quantum Key Distribution

Hoi-Kwong Lo et al.

PHYSICAL REVIEW LETTERS (2012)

Article Multidisciplinary Sciences

Conclusive quantum steering with superconducting transition-edge sensors

Devin H. Smith et al.

NATURE COMMUNICATIONS (2012)

Article Multidisciplinary Sciences

Tight finite-key analysis for quantum cryptography

Marco Tomamichel et al.

NATURE COMMUNICATIONS (2012)

Article Optics

Semi-device-independent security of one-way quantum key distribution

Marcin Pawlowski et al.

PHYSICAL REVIEW A (2011)

Article Physics, Multidisciplinary

Uncertainty Relation for Smooth Entropies

Marco Tomamichel et al.

PHYSICAL REVIEW LETTERS (2011)

Article Multidisciplinary Sciences

Secure device-independent quantum key distribution with causally independent measurement devices

Lluis Masanes et al.

NATURE COMMUNICATIONS (2011)

Article Multidisciplinary Sciences

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

Ilja Gerhardt et al.

NATURE COMMUNICATIONS (2011)

Article Optics

Practical decoy state quantum key distribution with finite resource

Y. G. Tan et al.

EUROPEAN PHYSICAL JOURNAL D (2010)

Letter Optics

Avoiding the blinding attack in QKD reply

Lars Lydersen et al.

NATURE PHOTONICS (2010)

Letter Optics

Avoiding the blinding attack in QKD

Z. L. Yuan et al.

NATURE PHOTONICS (2010)

Article Physics, Multidisciplinary

The uncertainty principle in the presence of quantum memory

Mario Berta et al.

NATURE PHYSICS (2010)

Article Physics, Multidisciplinary

Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

Feihu Xu et al.

NEW JOURNAL OF PHYSICS (2010)

Article Optics

Security proof for quantum key distribution using qudit systems

Lana Sheridan et al.

PHYSICAL REVIEW A (2010)

Article Physics, Multidisciplinary

Device-Independent Tests of Classical and Quantum Dimensions

Rodrigo Gallego et al.

PHYSICAL REVIEW LETTERS (2010)

Article Physics, Multidisciplinary

Device-independent quantum key distribution secure against collective attacks

Stefano Pironio et al.

NEW JOURNAL OF PHYSICS (2009)

Article Physics, Multidisciplinary

Simple security proof of quantum key distribution based on complementarity

M. Koashi

NEW JOURNAL OF PHYSICS (2009)

Article Physics, Multidisciplinary

Composability in quantum cryptography

Joern Mueller-Quade et al.

NEW JOURNAL OF PHYSICS (2009)

Article Physics, Multidisciplinary

Decoy state quantum key distribution with finite resources

Shi-Hai Sun et al.

PHYSICS LETTERS A (2009)

Article Optics

Security of decoy states QKD with finite resources against collective attacks

Hong-Wei Li et al.

OPTICS COMMUNICATIONS (2009)

Review Physics, Multidisciplinary

The security of practical quantum key distribution

Valerio Scarani et al.

REVIEWS OF MODERN PHYSICS (2009)

Article Optics

Experimental criteria for steering and the Einstein-Podolsky-Rosen paradox

E. G. Cavalcanti et al.

PHYSICAL REVIEW A (2009)

Article Computer Science, Theory & Methods

Security of quantum key distribution

Renato Renner

INTERNATIONAL JOURNAL OF QUANTUM INFORMATION (2008)

Article Physics, Multidisciplinary

Device-independent security of quantum cryptography against collective attacks

Antonio Acin et al.

PHYSICAL REVIEW LETTERS (2007)

Article Optics

Phase-remapping attack in practical quantum-key-distribution systems

Chi-Hang Fred Fung et al.

PHYSICAL REVIEW A (2007)

Article Computer Science, Theory & Methods

Efficient quantum key distribution scheme and a proof of its unconditional security

HK Lo et al.

JOURNAL OF CRYPTOLOGY (2005)

Article Computer Science, Hardware & Architecture

Unconditional security in quantum cryptography

D Mayers

JOURNAL OF THE ACM (2001)

Article Physics, Multidisciplinary

Simple proof of security of the BB84 quantum key distribution protocol

PW Shor et al.

PHYSICAL REVIEW LETTERS (2000)