4.3 Article

Reference-frame-independent quantum key distribution based on passive light source monitoring

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Optics

Measurement-device-independent quantum key distribution protocol with phase post-selection

Cong Jiang et al.

Summary: This study proposes a modified MDI-QKD protocol with phase post-selection, which eliminates the loopholes of detection devices using single-photon interference. The security of private phase announcement in the X basis is proven, and the phase post-selection method is applied to the double-scanning four-intensity MDI-QKD protocol. Numerical results demonstrate that the phase post-selection method significantly improves key rates at all distances. An accelerated method is also introduced to reduce the running time of global parameter optimization, making it practically useful in unstable channels.

PHOTONICS RESEARCH (2022)

Article Physics, Multidisciplinary

Efficient scheme for passive decoy-state reference-frame-independent quantum key distribution

Jian-Rong Zhu et al.

PHYSICS LETTERS A (2019)

Article Quantum Science & Technology

Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source

Jian-Rong Zhu et al.

QUANTUM INFORMATION PROCESSING (2018)

Article Physics, Multidisciplinary

Practical reference-frame-independent quantum key distribution systems against the worst relative rotation of reference frames

Chun-Mei Zhang et al.

JOURNAL OF PHYSICS COMMUNICATIONS (2018)

Article Optics

An attack aimed at active phase compensation in one-way phase-encoded QKD systems

Zhao-Yue Dong et al.

EUROPEAN PHYSICAL JOURNAL D (2014)

Article Physics, Multidisciplinary

Device Calibration Impacts Security of Quantum Key Distribution

Nitin Jain et al.

PHYSICAL REVIEW LETTERS (2011)

Article Optics

General theory of decoy-state quantum cryptography with source errors

Xiang-Bin Wang et al.

PHYSICAL REVIEW A (2008)

Article Physics, Multidisciplinary

Vortices, tunneling, and deconfinement in bilayer quantum Hall excitonic superfluid

ZQ Wang

PHYSICAL REVIEW LETTERS (2005)

Article Computer Science, Hardware & Architecture

Unconditional security in quantum cryptography

D Mayers

JOURNAL OF THE ACM (2001)

Article Physics, Multidisciplinary

Simple proof of security of the BB84 quantum key distribution protocol

PW Shor et al.

PHYSICAL REVIEW LETTERS (2000)