메뉴 건너뛰기




Volumn 11, Issue 5-6, 2011, Pages 0374-0389

Finite-key analysis for quantum key distribution with decoy states

Author keywords

Decoy states; Finite key; Quantum key distribution

Indexed keywords

PROBABILITY DISTRIBUTIONS; QUANTUM THEORY;

EID: 84863011429     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (30)
  • 2
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P.W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., Vol. 85, pp. 441-444.
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 3
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • B. Huttner, N. Imoto, N. Gisin, et al (1995), Quantum cryptography with coherent states, Phys. Rev. A, Vol. 51, pp. 1863-1869.
    • (1995) Phys. Rev. A , vol.51 , pp. 1863-1869
    • Huttner, B.1    Imoto, N.2    Gisin, N.3
  • 4
    • 0343536431 scopus 로고    scopus 로고
    • Limitations on practical quantum cryptography
    • G. Brassard, N. L̈utkenhaus, T. Mor, et al (2000), Limitations on practical quantum cryptography, Phys. Rev. Lett., Vol. 85, pp. 1330-1333.
    • (2000) Phys. Rev. Lett , vol.85 , pp. 1330-1333
    • Brassard, G.1
  • 5
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.Y. Hwang (2003), Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett., Vol. 91, pp. 057901.
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057901
    • Hwang, W.Y.1
  • 6
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.B. Wang (2005), Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett., Vol. 94, pp. 230503.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230503
    • Wang, X.B.1
  • 7
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.K. Lo, X.F. Ma, and K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett.,Vol. 94, pp. 230504.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230504
    • Lo, H.K.1    Ma, X.F.2    Chen, K.3
  • 8
    • 33344454530 scopus 로고    scopus 로고
    • Experimental quantum key distribution with decoy states
    • Y. Zhao, B. Qi, X.F. Ma, et al (2006), Experimental quantum key distribution with decoy states, Phys. Rev. Lett., Vol. 96, pp. 070502.
    • (2006) Phys. Rev. Lett , vol.96 , pp. 070502
    • Zhao, Y.1    Qi, B.2    Ma, X.F.3
  • 9
    • 33846363964 scopus 로고    scopus 로고
    • Long-distance decoy-state quantum key distribution in optical fiber
    • D. Rosenberg, J.W. Harrington, P.R. Rice, et al (2007), Long-distance decoy-state quantum key distribution in optical fiber, Phys. Rev. Lett., Vol. 98, pp. 010503.
    • (2007) Phys. Rev. Lett , vol.98 , pp. 010503
    • Rosenberg, D.1    Harrington, J.W.2    Rice, P.R.3
  • 10
    • 33846383808 scopus 로고    scopus 로고
    • Experimental demonstration of free-space decoystate quantum key distribution over 144 km
    • S.M. Tobias, Henning W., F. Martin, et al (2007), Experimental demonstration of free-space decoystate quantum key distribution over 144 km, Phys. Rev. Lett., Vol. 98, pp. 010504.
    • (2007) Phys. Rev. Lett , vol.98 , pp. 010504
    • Tobias, S.M.1    Henning, W.2    Martin, F.3
  • 11
    • 33846356424 scopus 로고    scopus 로고
    • Experimental long-distance decoy-state quantum key distribution based on polarization encoding
    • C.Z Peng, J. Zhang, D. Yang, et al (2007), Experimental long-distance decoy-state quantum key distribution based on polarization encoding, Phys. Rev. Lett., Vol. 98, pp. 010505.
    • (2007) Phys. Rev. Lett , vol.98 , pp. 010505
    • Peng, C.Z.1    Zhang, J.2    Yang, D.3
  • 12
    • 7044249607 scopus 로고    scopus 로고
    • Security of quantum key distribution with imperfect devices
    • N. Lutkenhaus D. Gottesman, H.K. Lo, et al (2004), Security of quantum key distribution with imperfect devices, Quantum Inf. Comput., Vol. 4, pp. 325.
    • (2004) Quantum Inf. Comput , vol.4 , pp. 325
    • Gottesman, N.1    Lutkenhaus, D.2    Lo, H.K.3
  • 13
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channels
    • D. Mayers (1996), Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology-Proceedings of Crypto'96(LNCS), Vol. 1109, pp. 343-357.
    • (1996) Advances In Cryptology-Proceedings of Crypto'96(LNCS) , vol.1109 , pp. 343-357
    • Mayers, D.1
  • 15
    • 34047263436 scopus 로고    scopus 로고
    • Small accessible quantum information does not imply security
    • R. König, R. Renner, A. Bariska, et al (2007), Small accessible quantum information does not imply security, Phys. Rev. Lett., Vol. 98, pp. 140502.
    • (2007) Phys. Rev. Lett , vol.98 , pp. 140502
    • König, R.1    Renner, R.2    Bariska, A.3
  • 16
    • 34547400660 scopus 로고    scopus 로고
    • Upper bounds of eavesdropper's performances in finite-length code with the decoy method
    • M. Hayashi (2007), Upper bounds of eavesdropper's performances in finite-length code with the decoy method, Phys. Rev. A, Vol. 76, pp. 012329.
    • (2007) Phys. Rev. A , vol.76 , pp. 012329
    • Hayashi, M.1
  • 17
    • 71649097222 scopus 로고    scopus 로고
    • Security analysis of decoy state quantum key distribution incorporating finite statistics
    • arXiv:0707.3541
    • J. Hasegawa, M. Hayashi, T. Hiroshima, et al (2007), Security analysis of decoy state quantum key distribution incorporating finite statistics, arXiv:0707.3541.
    • (2007)
    • Hasegawa, J.1    Hayashi, M.2    Hiroshima, T.3
  • 18
    • 34548303396 scopus 로고    scopus 로고
    • General theory for decoy-state quantum key distribution with an arbitrary number of intensities
    • M. Hayashi (2007), General theory for decoy-state quantum key distribution with an arbitrary number of intensities, New Journal of Physics, Vol. 9, pp. 284.
    • (2007) New Journal of Physics , vol.9 , pp. 284
    • Hayashi, M.1
  • 19
    • 40749135368 scopus 로고    scopus 로고
    • Exact minimum and maximum of yield with a finite number of decoy light intensities
    • T. Tsurumaru, A. Soujaeff, and S. Takeuchi (2008), Exact minimum and maximum of yield with a finite number of decoy light intensities, Phys. Rev. A, Vol. 77, pp. 022319.
    • (2008) Phys. Rev. A , vol.77 , pp. 022319
    • Tsurumaru, T.1    Soujaeff, A.2    Takeuchi, S.3
  • 20
    • 44049101670 scopus 로고    scopus 로고
    • Security of quantum key distribution
    • R. Renner (2008), Security of quantum key distribution, Int. J. Quantum Inf., Vol. 1, pp. 1-127.
    • (2008) Int. J. Quantum Inf , vol.1 , pp. 1-127
    • Renner, R.1
  • 21
    • 44249110247 scopus 로고    scopus 로고
    • Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
    • V. Scarani and R. Renner (2008), Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing, Phys. Rev. Lett., Vol. 100(20), pp. 200501.
    • (2008) Phys. Rev. Lett , vol.100 , Issue.20 , pp. 200501
    • Scarani, V.1    Renner, R.2
  • 22
    • 58049109215 scopus 로고    scopus 로고
    • Security bounds for quantum cryptography with finite resources
    • (Lecture Notes In Computer Science)
    • V. Scarani and R. Renner (2008), Security bounds for quantum cryptography with finite resources, In Proc. TQC2008 (Lecture Notes in Computer Science), Vol. 5106, pp. 83-95.
    • (2008) Proc. TQC2008 , vol.5106 , pp. 83-95
    • Scarani, V.1    Renner, R.2
  • 23
    • 66449092549 scopus 로고    scopus 로고
    • Finite-key analysis for practical implementations of quantum key distribution
    • R.Y.Q. Cai and V. Scarani (2009), Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, Vol. 11, pp. 045024.
    • (2009) New Journal of Physics , vol.11 , pp. 045024
    • Cai, R.Y.Q.1    Scarani, V.2
  • 24
    • 33750530122 scopus 로고    scopus 로고
    • Finite key analysis for symmetric attacks in quantum key distribution
    • T. Meyer, H. Kampermann, M. Kleinmann, et al (2006), Finite key analysis for symmetric attacks in quantum key distribution, Phys. Rev. A, Vol. 74, pp. 042340.
    • (2006) Phys. Rev. A , vol.74 , pp. 042340
    • Meyer, T.1    Kampermann, H.2    Kleinmann, M.3
  • 25
    • 69149107383 scopus 로고    scopus 로고
    • Security of decoy states qkd with finite resources against collective attacks
    • H.W. Li, Y.B. Zhao, Z.Q. Yin, et al (2009), Security of decoy states qkd with finite resources against collective attacks, Opt. Commun., Vol. 282, pp. 4162 - 4166.
    • (2009) Opt. Commun , vol.282 , pp. 4162-4166
    • Li, H.W.1    Zhao, Y.B.2    Yin, Z.Q.3
  • 26
    • 34548394977 scopus 로고    scopus 로고
    • Symmetry of large physical systems implies independence of subsystems
    • R. Renner (2007), Symmetry of large physical systems implies independence of subsystems, Nature Phys., Vol. 3, pp. 645 - 649.
    • (2007) Nature Phys , vol.3 , pp. 645-649
    • Renner, R.1
  • 27
    • 78649704344 scopus 로고    scopus 로고
    • Secure key rate of the bb84 protocol using finite sample bits
    • Y. Sano, R. Matsumoto, and T. Uyematsu (2010), Secure key rate of the bb84 protocol using finite sample bits, J. Phys. A: Math. Theor., Vol. 43, pp. 495302.
    • (2010) J. Phys. A: Math. Theor , vol.43 , pp. 495302
    • Sano, Y.1    Matsumoto, R.2    Uyematsu, T.3
  • 28
    • 44149092178 scopus 로고    scopus 로고
    • Quantum key distribution with an unknown and untrusted source
    • Y. Zhao, B. Qi, and H.K. Lo (2008), Quantum key distribution with an unknown and untrusted source, Phys. Rev. A, Vol. 77, pp. 052327.
    • (2008) Phys. Rev. A , vol.77 , pp. 052327
    • Zhao, Y.1    Qi, B.2    Lo, H.K.3
  • 29
    • 66449101012 scopus 로고    scopus 로고
    • Security proof of quantum key distribution with detection efficiency mismatch
    • B. Qi, H.K. Lo, X.F. Ma, et al (2009), Security proof of quantum key distribution with detection efficiency mismatch, Quantum Inf. Comput, Vol. 9, pp. 131-165.
    • (2009) Quantum Inf. Comput , vol.9 , pp. 131-165
    • Qi, B.1    Lo, H.K.2    Ma, X.F.3
  • 30
    • 33846365694 scopus 로고    scopus 로고
    • Effects of detector efficiency mismatch on security of quantum cryptosystems
    • V. Makarov, A. Anisimov, and J. Skaar (2006), Effects of detector efficiency mismatch on security of quantum cryptosystems, Phys. Rev. A, Vol. 74, pp. 022313.
    • (2006) Phys. Rev. A , vol.74 , pp. 022313
    • Makarov, V.1    Anisimov, A.2    Skaar, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.