메뉴 건너뛰기




Volumn 21, Issue 21, 2013, Pages 24550-24565

Efficient decoy-state quantum key distribution with quantified security

Author keywords

[No Author keywords available]

Indexed keywords

QUANTUM CRYPTOGRAPHY;

EID: 84886398734     PISSN: None     EISSN: 10944087     Source Type: Journal    
DOI: 10.1364/OE.21.024550     Document Type: Article
Times cited : (239)

References (48)
  • 1
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner, "Conjugate coding," Sigact News 15(1), 78-88 (1983).
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 3
    • 0343152990 scopus 로고
    • Quantum cryptography based on bell's theorem
    • A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett. 67(6), 661-663 (1991).
    • (1991) Phys. Rev. Lett. , vol.67 , Issue.6 , pp. 661-663
    • Ekert, A.K.1
  • 6
    • 0027912088 scopus 로고
    • Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography
    • P. D. Townsend, J. G. Rarity, and P. R. Tapster, "Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography," Electron. Lett. 29(14), 1291 (1993).
    • (1993) Electron. Lett. , vol.29 , Issue.14 , pp. 1291
    • Townsend, P.D.1    Rarity, J.G.2    Tapster, P.R.3
  • 13
    • 33846980802 scopus 로고    scopus 로고
    • Unconditional security of practical quantum key distribution
    • H. Inamori, N. Lütkenhaus, and D. Mayers, "Unconditional security of practical quantum key distribution," Eur. Phys. J. D 41(3), 599-627 (2007).
    • (2007) Eur. Phys. J. D , vol.41 , Issue.3 , pp. 599-627
    • Inamori, H.1    Lütkenhaus, N.2    Mayers, D.3
  • 14
    • 33846151029 scopus 로고    scopus 로고
    • Noise tolerance of the bb84 protocol with random privacy amplification
    • S. Watanabe, R. Matsumoto, and T. Uyematsu, "Noise tolerance of the BB84 protocol with random privacy amplification," Int. J. Quantum Inf. 4(6), 935-946 (2006).
    • (2006) Int. J. Quantum Inf. , vol.4 , Issue.6 , pp. 935-946
    • Watanabe, S.1    Matsumoto, R.2    Uyematsu, T.3
  • 15
    • 33746924011 scopus 로고    scopus 로고
    • Practical evaluation of security for quantum key distribution
    • M. Hayashi, "Practical evaluation of security for quantum key distribution," Phys. Rev. A 74(2), 022307 (2006).
    • (2006) Phys. Rev. A , vol.74 , Issue.2 , pp. 022307
    • Hayashi, M.1
  • 16
    • 34547400660 scopus 로고    scopus 로고
    • Upper bounds of eavesdropper's performances in finite-length code with the decoy method
    • M. Hayashi, "Upper bounds of eavesdropper's performances in finite-length code with the decoy method," Phys. Rev. A 76(1), 012329 (2007).
    • (2007) Phys. Rev. A , vol.76 , Issue.1 , pp. 012329
    • Hayashi, M.1
  • 17
    • 44249110247 scopus 로고    scopus 로고
    • Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
    • V. Scarani and R. Renner, "Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing," Phys. Rev. Lett. 100(20), 200501 (2008).
    • (2008) Phys. Rev. Lett. , vol.100 , Issue.20 , pp. 200501
    • Scarani, V.1    Renner, R.2
  • 19
    • 84856702807 scopus 로고    scopus 로고
    • Tight finite-key analysis for quantum cryptography
    • M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, "Tight finite-key analysis for quantum cryptography," Nat Commun 3, 634 (2012).
    • (2012) Nat Commun , vol.3 , pp. 634
    • Tomamichel, M.1    Lim, C.C.W.2    Gisin, N.3    Renner, R.4
  • 20
    • 27144550522 scopus 로고    scopus 로고
    • Information-theoretic security proof for quantum-key-distribution protocols
    • R. Renner, N. Gisin, and B. Kraus, "Information-theoretic security proof for quantum-key-distribution protocols," Phys. Rev. A 72(1), 012332 (2005).
    • (2005) Phys. Rev. A , vol.72 , Issue.1 , pp. 012332
    • Renner, R.1    Gisin, N.2    Kraus, B.3
  • 21
    • 27144544067 scopus 로고    scopus 로고
    • Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication
    • B. Kraus, N. Gisin, and R. Renner, "Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication," Phys. Rev. Lett. 95(8), 080501 (2005).
    • (2005) Phys. Rev. Lett. , vol.95 , Issue.8 , pp. 080501
    • Kraus, B.1    Gisin, N.2    Renner, R.3
  • 22
    • 17444398022 scopus 로고    scopus 로고
    • Efficient quantum key distribution scheme and proof of its unconditional security
    • H.-K. Lo, H. F. Chau, and M. Ardehali, "Efficient quantum key distribution scheme and proof of its unconditional security," J. of Crypt. 18(2), 133-165 (2005).
    • (2005) J. of Crypt. , vol.18 , Issue.2 , pp. 133-165
    • Lo, H.-K.1    Chau, H.F.2    Ardehali, M.3
  • 23
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.-Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91(5), 057901 (2003).
    • (2003) Phys. Rev. Lett. , vol.91 , Issue.5 , pp. 057901
    • Hwang, W.-Y.1
  • 24
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B. Wang, "Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94(23), 230503 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , Issue.23 , pp. 230503
    • Wang, X.-B.1
  • 25
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94(23), 230504 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , Issue.23 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 26
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum key distribution
    • X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, "Practical decoy state for quantum key distribution," Phys. Rev. A 72(1), 012326 (2005).
    • (2005) Phys. Rev. A , vol.72 , Issue.1 , pp. 012326
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 27
    • 66449092549 scopus 로고    scopus 로고
    • Finite-key analysis for practical implementations of quantum key distribution
    • R. Y. Q. Cai and V. Scarani, "Finite-key analysis for practical implementations of quantum key distribution," New J. Phys. 11(4), 045024 (2009).
    • (2009) New J. Phys. , vol.11 , Issue.4 , pp. 045024
    • Cai, R.Y.Q.1    Scarani, V.2
  • 30
    • 84882768205 scopus 로고    scopus 로고
    • Decoy-state quantum key distribution with biased basis choice
    • Z. Wei, W. Wang, Z. Zhang, M. Gao, Z. Ma, and X. Ma, "Decoy-state quantum key distribution with biased basis choice," Sci Rep 3, 2453 (2013).
    • (2013) Sci Rep , vol.3 , pp. 2453
    • Wei, Z.1    Wang, W.2    Zhang, Z.3    Gao, M.4    Ma, Z.5    Ma, X.6
  • 31
    • 50249155870 scopus 로고    scopus 로고
    • Squashing models for optical measurements in quantum communication
    • N. J. Beaudry, T. Moroder, and N. Lütkenhaus, "Squashing models for optical measurements in quantum communication," Phys. Rev. Lett. 101(9), 093601 (2008).
    • (2008) Phys. Rev. Lett. , vol.101 , Issue.9 , pp. 093601
    • Beaudry, N.J.1    Moroder, T.2    Lütkenhaus, N.3
  • 32
    • 51149094999 scopus 로고    scopus 로고
    • Security proof for qkd systems with threshold detectors
    • T. Tsurumaru and K. Tamaki, "Security proof for QKD systems with threshold detectors," Phys. Rev. A 78, 032302 (2008).
    • (2008) Phys. Rev. A , vol.78 , pp. 032302
    • Tsurumaru, T.1    Tamaki, K.2
  • 34
    • 0037422980 scopus 로고    scopus 로고
    • Secure quantum key distribution with an uncharacterized source
    • M. Koashi and J. Preskill, "Secure quantum key distribution with an uncharacterized source," Phys. Rev. Lett. 90(5), 057902 (2003).
    • (2003) Phys. Rev. Lett. , vol.90 , Issue.5 , pp. 057902
    • Koashi, M.1    Preskill, J.2
  • 35
    • 34547506608 scopus 로고    scopus 로고
    • Security of quantum key distribution using weak coherent states with nonrandom phases
    • H. K. Lo and J. Preskill, "Security of quantum key distribution using weak coherent states with nonrandom phases," Quantum Inf. Comput. 7, 431 (2007).
    • (2007) Quantum Inf. Comput. , vol.7 , pp. 431
    • Lo, H.K.1    Preskill, J.2
  • 37
    • 84925623234 scopus 로고
    • Tests of statistical hypotheses concerning several parameters when the number of observations is large
    • A. Wald, "Tests of statistical hypotheses concerning several parameters when the number of observations is large," in Transactions of the American Mathematical Society, vol. 54 (1943), pp. 426-482.
    • (1943) Transactions of the American Mathematical Society , vol.54 , pp. 426-482
    • Wald, A.1
  • 38
    • 0032377357 scopus 로고    scopus 로고
    • Approximate is better than 'exact' for interval estimation of binomial proportions
    • A. Agresti and B. A. Coull, "Approximate is better than 'exact' for interval estimation of binomial proportions," Am. Stat. 52, 119 (1998).
    • (1998) Am. Stat. , vol.52 , pp. 119
    • Agresti, A.1    Coull, B.A.2
  • 41
    • 0001072895 scopus 로고
    • The use of confidence or fiducial limits illustrated in the case of the binomial
    • C. Clopper and E. S. Pearson, "The use of confidence or fiducial limits illustrated in the case of the binomial," Biometrika 26(4), 404-413 (1934).
    • (1934) Biometrika , vol.26 , Issue.4 , pp. 404-413
    • Clopper, C.1    Pearson, E.S.2
  • 42
    • 34548394977 scopus 로고    scopus 로고
    • Symmetry of large physical systems implies independence of subsystems
    • R. Renner, "Symmetry of large physical systems implies independence of subsystems," Nat. Phys. 3(9), 645-649 (2007).
    • (2007) Nat. Phys. , vol.3 , Issue.9 , pp. 645-649
    • Renner, R.1
  • 44
    • 34547394809 scopus 로고    scopus 로고
    • High speed single photon detection in the near infrared
    • Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, "High speed single photon detection in the near infrared," Appl. Phys. Lett. 91(4), 041114 (2007).
    • (2007) Appl. Phys. Lett. , vol.91 , Issue.4 , pp. 041114
    • Yuan, Z.L.1    Kardynal, B.E.2    Sharpe, A.W.3    Shields, A.J.4
  • 45
    • 66449136283 scopus 로고    scopus 로고
    • Entangled quantum key distribution with a biased basis choice
    • C. Erven, X. Ma, R. Lãamme, and G. Weihs, "Entangled quantum key distribution with a biased basis choice," New J. Phys. 11(4), 045025 (2009).
    • (2009) New J. Phys. , vol.11 , Issue.4 , pp. 045025
    • Erven, C.1    Ma, X.2    Lãamme, R.3    Weihs, G.4
  • 48
    • 84877578573 scopus 로고    scopus 로고
    • Experimental demonstration of longdistance continuous-variable quantum key distribution
    • P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, "Experimental demonstration of longdistance continuous-variable quantum key distribution," Nat. Photonics 7(5), 378-381 (2013).
    • (2013) Nat. Photonics , vol.7 , Issue.5 , pp. 378-381
    • Jouguet, P.1    Kunz-Jacques, S.2    Leverrier, A.3    Grangier, P.4    Diamanti, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.