相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Measurement-Device-Independent Twin-Field Quantum Key Distribution
Hua-Lei Yin et al.
SCIENTIFIC REPORTS (2019)
Device-independent quantum random-number generation
Yang Liu et al.
NATURE (2018)
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters
M. Lucamarini et al.
NATURE (2018)
Secure Quantum Key Distribution over 421 km of Optical Fiber
Alberto Boaron et al.
PHYSICAL REVIEW LETTERS (2018)
Twin-field quantum key distribution with large misalignment error
Xiang-Bin Wang et al.
PHYSICAL REVIEW A (2018)
Satellite-to-ground quantum key distribution
Sheng-Kai Liao et al.
NATURE (2017)
Improved measurement-device-independent quantum key distribution with uncharacterized qubits
Won-Young Hwang et al.
PHYSICAL REVIEW A (2017)
Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber
Hua-Lei Yin et al.
PHYSICAL REVIEW LETTERS (2016)
Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution
Chao Wang et al.
PHYSICAL REVIEW LETTERS (2015)
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
Zhiyuan Tang et al.
PHYSICAL REVIEW LETTERS (2014)
Measurement-device-independent quantum key distribution with uncharacterized qubit sources
Zhen-Qiang Yin et al.
PHYSICAL REVIEW A (2013)
Source attack of decoy-state quantum key distribution using phase information
Yan-Lin Tang et al.
PHYSICAL REVIEW A (2013)
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
T. Ferreira da Silva et al.
PHYSICAL REVIEW A (2013)
Experimental Measurement-Device-Independent Quantum Key Distribution
Yang Liu et al.
PHYSICAL REVIEW LETTERS (2013)
Multiple-Access Quantum Key Distribution Networks
Mohsen Razavi
IEEE TRANSACTIONS ON COMMUNICATIONS (2012)
Alternative schemes for measurement-device-independent quantum key distribution
Xiongfeng Ma et al.
PHYSICAL REVIEW A (2012)
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw
Kiyoshi Tamaki et al.
PHYSICAL REVIEW A (2012)
Measurement-Device-Independent Quantum Key Distribution
Hoi-Kwong Lo et al.
PHYSICAL REVIEW LETTERS (2012)
Universally composable and customizable post-processing for practical quantum key distribution
Xiongfeng Ma et al.
COMPUTERS & SECURITY (2011)
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Ilja Gerhardt et al.
NATURE COMMUNICATIONS (2011)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
Simple security proof of quantum key distribution based on complementarity
M. Koashi
NEW JOURNAL OF PHYSICS (2009)
High-fidelity entanglement swapping with fully independent sources
Rainer Kaltenbaek et al.
PHYSICAL REVIEW A (2009)
Quantum key distribution with triggering parametric down-conversion sources
Xiongfeng Ma et al.
NEW JOURNAL OF PHYSICS (2008)
Quantum key distribution with an unknown and untrusted source
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Security proof for quantum-key-distribution systems with threshold detectors
Toyohiro Tsurumaru et al.
PHYSICAL REVIEW A (2008)
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Effects of detector efficiency mismatch on security of quantum cryptosystems [Phys. Rev. A 74, 022313 (2006)]
Vadim Makarov et al.
PHYSICAL REVIEW A (2008)
Squashing models for optical measurements in quantum communication
Normand J. Beaudry et al.
PHYSICAL REVIEW LETTERS (2008)
Long-distance entanglement distribution with single-photon sources
Nicolas Sangouard et al.
PHYSICAL REVIEW A (2007)
Entanglement-based quantum communication over 144km
R. Ursin et al.
NATURE PHYSICS (2007)
Device-independent security of quantum cryptography against collective attacks
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2007)
From Bell's theorem to secure quantum key distribution
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2006)
Decoy-state protocol for quantum cryptography with four different intensities of coherent light
XB Wang
PHYSICAL REVIEW A (2005)
Practical decoy state for quantum key distribution
XF Ma et al.
PHYSICAL REVIEW A (2005)
Decoy state quantum key distribution
HK Lo et al.
PHYSICAL REVIEW LETTERS (2005)
Beating the photon-number-splitting attack in practical quantum cryptography
XB Wang
PHYSICAL REVIEW LETTERS (2005)
Quantum key distribution with high loss: Toward global secure communication
WY Hwang
PHYSICAL REVIEW LETTERS (2003)
Long-distance quantum communication with atomic ensembles and linear optics
LM Duan et al.
NATURE (2001)
Simple proof of security of the BB84 quantum key distribution protocol
PW Shor et al.
PHYSICAL REVIEW LETTERS (2000)