-
1
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, "Conjugate coding," Sigact News 15(1), 78-88 (1983).
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
2
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
Institute of Electrical and Electronics Engineers, New York
-
C. H. Bennett and G. Brassard, "Quantum cryptography: public-key distribution and coin tossing," in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (Institute of Electrical and Electronics Engineers, New York, 1984), pp. 175-179.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
3
-
-
0343152990
-
Quantum cryptography based on bell's theorem
-
A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett. 67(6), 661-663 (1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, Issue.6
, pp. 661-663
-
-
Ekert, A.K.1
-
4
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74(1), 145-195 (2002).
-
(2002)
Rev. Mod. Phys.
, vol.74
, Issue.1
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
5
-
-
70449402318
-
The security of practical quantum key distribution
-
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. DuŠek, N. Lütkenhaus, and M. Peev, "The security of practical quantum key distribution," Rev. Mod. Phys. 81(3), 1301-1350 (2009).
-
(2009)
Rev. Mod. Phys.
, vol.81
, Issue.3
, pp. 1301-1350
-
-
Scarani, V.1
Bechmann-Pasquinucci, H.2
Cerf, N.J.3
Dušek, M.4
Lütkenhaus, N.5
Peev, M.6
-
6
-
-
0027912088
-
Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography
-
P. D. Townsend, J. G. Rarity, and P. R. Tapster, "Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography," Electron. Lett. 29(14), 1291 (1993).
-
(1993)
Electron. Lett.
, vol.29
, Issue.14
, pp. 1291
-
-
Townsend, P.D.1
Rarity, J.G.2
Tapster, P.R.3
-
7
-
-
67651210369
-
The secoqc quantum key distribution network in vienna
-
M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. F. Dynes, S. Fasel, S. Fossier, M. Fürst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hübel, G. Humer, T. Länger, M. Legré, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail, A. W. Sharpe, A. J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel, N. Walenta, H. Weier, H. Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger, "The SECOQC quantum key distribution network in Vienna," New J. Phys. 11(7), 075001 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.7
, pp. 075001
-
-
Peev, M.1
Pacher, C.2
Alléaume, R.3
Barreiro, C.4
Bouda, J.5
Boxleitner, W.6
Debuisschert, T.7
Diamanti, E.8
Dianati, M.9
Dynes, J.F.10
Fasel, S.11
Fossier, S.12
Fürst, M.13
Gautier, J.-D.14
Gay, O.15
Gisin, N.16
Grangier, P.17
Happe, A.18
Hasani, Y.19
Hentschel, M.20
Hübel, H.21
Humer, G.22
Länger, T.23
Legré, M.24
Lieger, R.25
Lodewyck, J.26
Lorünser, T.27
Lütkenhaus, N.28
Marhold, A.29
Matyus, T.30
Maurhart, O.31
Monat, L.32
Nauerth, S.33
Page, J.-B.34
Poppe, A.35
Querasser, E.36
Ribordy, G.37
Robyr, S.38
Salvail, L.39
Sharpe, A.W.40
Shields, A.J.41
Stucki, D.42
Suda, M.43
Tamas, C.44
Themel, T.45
Thew, R.T.46
Thoma, Y.47
Treiber, A.48
Trinkler, P.49
Tualle-Brouri, R.50
Vannel, F.51
Walenta, N.52
Weier, H.53
Weinfurter, H.54
Wimberger, I.55
Yuan, Z.L.56
Zbinden, H.57
Zeilinger, A.58
more..
-
8
-
-
79957605027
-
Field test of quantum key distribution in the tokyo qkd network
-
M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J. B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger, "Field test of quantum key distribution in the Tokyo QKD Network," Opt. Express 19(11), 10387-10409 (2011).
-
(2011)
Opt. Express
, vol.19
, Issue.11
, pp. 10387-10409
-
-
Sasaki, M.1
Fujiwara, M.2
Ishizuka, H.3
Klaus, W.4
Wakui, K.5
Takeoka, M.6
Miki, S.7
Yamashita, T.8
Wang, Z.9
Tanaka, A.10
Yoshino, K.11
Nambu, Y.12
Takahashi, S.13
Tajima, A.14
Tomita, A.15
Domeki, T.16
Hasegawa, T.17
Sakai, Y.18
Kobayashi, H.19
Asai, T.20
Shimizu, K.21
Tokura, T.22
Tsurumaru, T.23
Matsui, M.24
Honjo, T.25
Tamaki, K.26
Takesue, H.27
Tokura, Y.28
Dynes, J.F.29
Dixon, A.R.30
Sharpe, A.W.31
Yuan, Z.L.32
Shields, A.J.33
Uchikoga, S.34
Legré, M.35
Robyr, S.36
Trinkler, P.37
Monat, L.38
Page, J.B.39
Ribordy, G.40
Poppe, A.41
Allacher, A.42
Maurhart, O.43
Länger, T.44
Peev, M.45
Zeilinger, A.46
more..
-
9
-
-
84872402766
-
Coexistence of high-bit-rate quantum key distribution and data on optical fiber
-
K. Patel, J. F. Dynes, I. Choi, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, "Coexistence of high-bit-rate quantum key distribution and data on optical fiber," Phys. Rev. X 2(4), 041010 (2012).
-
(2012)
Phys. Rev. X
, vol.2
, Issue.4
, pp. 041010
-
-
Patel, K.1
Dynes, J.F.2
Choi, I.3
Sharpe, A.W.4
Dixon, A.R.5
Yuan, Z.L.6
Penty, R.V.7
Shields, A.J.8
-
10
-
-
84883662673
-
A quantum access network
-
B. Fröhlich, J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. J. Shields, "A quantum access network," Nature 501(7465), 69-72 (2013).
-
(2013)
Nature
, vol.501
, Issue.7465
, pp. 69-72
-
-
Fröhlich, B.1
Dynes, J.F.2
Lucamarini, M.3
Sharpe, A.W.4
Yuan, Z.5
Shields, A.J.6
-
11
-
-
84957696255
-
-
D. Coppersmith, Ed. (Springer-Verlag)
-
D. Mayers, D. Coppersmith, ed., in Advances in Cryptology: Proceedings of CRYPTO '95, vol. 963 of Lecture Notes in Computer Science, D. Coppersmith, Ed. (Springer-Verlag, 1995), pp. 124-135;
-
(1995)
Advances in Cryptology: Proceedings of CRYPTO '95, Vol. 963 of Lecture Notes in Computer Science
, pp. 124-135
-
-
Mayers, D.1
Coppersmith, D.2
-
13
-
-
33846980802
-
Unconditional security of practical quantum key distribution
-
H. Inamori, N. Lütkenhaus, and D. Mayers, "Unconditional security of practical quantum key distribution," Eur. Phys. J. D 41(3), 599-627 (2007).
-
(2007)
Eur. Phys. J. D
, vol.41
, Issue.3
, pp. 599-627
-
-
Inamori, H.1
Lütkenhaus, N.2
Mayers, D.3
-
14
-
-
33846151029
-
Noise tolerance of the bb84 protocol with random privacy amplification
-
S. Watanabe, R. Matsumoto, and T. Uyematsu, "Noise tolerance of the BB84 protocol with random privacy amplification," Int. J. Quantum Inf. 4(6), 935-946 (2006).
-
(2006)
Int. J. Quantum Inf.
, vol.4
, Issue.6
, pp. 935-946
-
-
Watanabe, S.1
Matsumoto, R.2
Uyematsu, T.3
-
15
-
-
33746924011
-
Practical evaluation of security for quantum key distribution
-
M. Hayashi, "Practical evaluation of security for quantum key distribution," Phys. Rev. A 74(2), 022307 (2006).
-
(2006)
Phys. Rev. A
, vol.74
, Issue.2
, pp. 022307
-
-
Hayashi, M.1
-
16
-
-
34547400660
-
Upper bounds of eavesdropper's performances in finite-length code with the decoy method
-
M. Hayashi, "Upper bounds of eavesdropper's performances in finite-length code with the decoy method," Phys. Rev. A 76(1), 012329 (2007).
-
(2007)
Phys. Rev. A
, vol.76
, Issue.1
, pp. 012329
-
-
Hayashi, M.1
-
17
-
-
44249110247
-
Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
-
V. Scarani and R. Renner, "Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing," Phys. Rev. Lett. 100(20), 200501 (2008).
-
(2008)
Phys. Rev. Lett.
, vol.100
, Issue.20
, pp. 200501
-
-
Scarani, V.1
Renner, R.2
-
18
-
-
58049109215
-
Security bounds for quantum cryptography with finite resources
-
(Berlin Springer)
-
V. Scarani and R. Renner, "Security bounds for quantum cryptography with finite resources," in Theory of Quantum Computation, Communication, and Cryptography, vol. 5106 of Lecture Notes in Computer Science, (Berlin Springer, 2008), pp 83-95.
-
(2008)
Theory of Quantum Computation, Communication, and Cryptography, Vol. 5106 of Lecture Notes in Computer Science
, pp. 83-89
-
-
Scarani, V.1
Renner, R.2
-
19
-
-
84856702807
-
Tight finite-key analysis for quantum cryptography
-
M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, "Tight finite-key analysis for quantum cryptography," Nat Commun 3, 634 (2012).
-
(2012)
Nat Commun
, vol.3
, pp. 634
-
-
Tomamichel, M.1
Lim, C.C.W.2
Gisin, N.3
Renner, R.4
-
20
-
-
27144550522
-
Information-theoretic security proof for quantum-key-distribution protocols
-
R. Renner, N. Gisin, and B. Kraus, "Information-theoretic security proof for quantum-key-distribution protocols," Phys. Rev. A 72(1), 012332 (2005).
-
(2005)
Phys. Rev. A
, vol.72
, Issue.1
, pp. 012332
-
-
Renner, R.1
Gisin, N.2
Kraus, B.3
-
21
-
-
27144544067
-
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication
-
B. Kraus, N. Gisin, and R. Renner, "Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication," Phys. Rev. Lett. 95(8), 080501 (2005).
-
(2005)
Phys. Rev. Lett.
, vol.95
, Issue.8
, pp. 080501
-
-
Kraus, B.1
Gisin, N.2
Renner, R.3
-
22
-
-
17444398022
-
Efficient quantum key distribution scheme and proof of its unconditional security
-
H.-K. Lo, H. F. Chau, and M. Ardehali, "Efficient quantum key distribution scheme and proof of its unconditional security," J. of Crypt. 18(2), 133-165 (2005).
-
(2005)
J. of Crypt.
, vol.18
, Issue.2
, pp. 133-165
-
-
Lo, H.-K.1
Chau, H.F.2
Ardehali, M.3
-
23
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.-Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91(5), 057901 (2003).
-
(2003)
Phys. Rev. Lett.
, vol.91
, Issue.5
, pp. 057901
-
-
Hwang, W.-Y.1
-
24
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
X.-B. Wang, "Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94(23), 230503 (2005).
-
(2005)
Phys. Rev. Lett.
, vol.94
, Issue.23
, pp. 230503
-
-
Wang, X.-B.1
-
25
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94(23), 230504 (2005).
-
(2005)
Phys. Rev. Lett.
, vol.94
, Issue.23
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
26
-
-
27144453296
-
Practical decoy state for quantum key distribution
-
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, "Practical decoy state for quantum key distribution," Phys. Rev. A 72(1), 012326 (2005).
-
(2005)
Phys. Rev. A
, vol.72
, Issue.1
, pp. 012326
-
-
Ma, X.1
Qi, B.2
Zhao, Y.3
Lo, H.-K.4
-
27
-
-
66449092549
-
Finite-key analysis for practical implementations of quantum key distribution
-
R. Y. Q. Cai and V. Scarani, "Finite-key analysis for practical implementations of quantum key distribution," New J. Phys. 11(4), 045024 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.4
, pp. 045024
-
-
Cai, R.Y.Q.1
Scarani, V.2
-
28
-
-
84885234350
-
Practical treatment of quantum bugs
-
M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, "Practical treatment of quantum bugs," Proc. SPIE 8542, Electro-Optical Remote Sensing, Photonic Technologies, and Applications VI (2012).
-
(2012)
Proc. SPIE 8542, Electro-Optical Remote Sensing, Photonic Technologies, and Applications VI
-
-
Lucamarini, M.1
Dynes, J.F.2
Yuan, Z.L.3
Shields, A.J.4
-
30
-
-
84882768205
-
Decoy-state quantum key distribution with biased basis choice
-
Z. Wei, W. Wang, Z. Zhang, M. Gao, Z. Ma, and X. Ma, "Decoy-state quantum key distribution with biased basis choice," Sci Rep 3, 2453 (2013).
-
(2013)
Sci Rep
, vol.3
, pp. 2453
-
-
Wei, Z.1
Wang, W.2
Zhang, Z.3
Gao, M.4
Ma, Z.5
Ma, X.6
-
31
-
-
50249155870
-
Squashing models for optical measurements in quantum communication
-
N. J. Beaudry, T. Moroder, and N. Lütkenhaus, "Squashing models for optical measurements in quantum communication," Phys. Rev. Lett. 101(9), 093601 (2008).
-
(2008)
Phys. Rev. Lett.
, vol.101
, Issue.9
, pp. 093601
-
-
Beaudry, N.J.1
Moroder, T.2
Lütkenhaus, N.3
-
32
-
-
51149094999
-
Security proof for qkd systems with threshold detectors
-
T. Tsurumaru and K. Tamaki, "Security proof for QKD systems with threshold detectors," Phys. Rev. A 78, 032302 (2008).
-
(2008)
Phys. Rev. A
, vol.78
, pp. 032302
-
-
Tsurumaru, T.1
Tamaki, K.2
-
34
-
-
0037422980
-
Secure quantum key distribution with an uncharacterized source
-
M. Koashi and J. Preskill, "Secure quantum key distribution with an uncharacterized source," Phys. Rev. Lett. 90(5), 057902 (2003).
-
(2003)
Phys. Rev. Lett.
, vol.90
, Issue.5
, pp. 057902
-
-
Koashi, M.1
Preskill, J.2
-
35
-
-
34547506608
-
Security of quantum key distribution using weak coherent states with nonrandom phases
-
H. K. Lo and J. Preskill, "Security of quantum key distribution using weak coherent states with nonrandom phases," Quantum Inf. Comput. 7, 431 (2007).
-
(2007)
Quantum Inf. Comput.
, vol.7
, pp. 431
-
-
Lo, H.K.1
Preskill, J.2
-
37
-
-
84925623234
-
Tests of statistical hypotheses concerning several parameters when the number of observations is large
-
A. Wald, "Tests of statistical hypotheses concerning several parameters when the number of observations is large," in Transactions of the American Mathematical Society, vol. 54 (1943), pp. 426-482.
-
(1943)
Transactions of the American Mathematical Society
, vol.54
, pp. 426-482
-
-
Wald, A.1
-
38
-
-
0032377357
-
Approximate is better than 'exact' for interval estimation of binomial proportions
-
A. Agresti and B. A. Coull, "Approximate is better than 'exact' for interval estimation of binomial proportions," Am. Stat. 52, 119 (1998).
-
(1998)
Am. Stat.
, vol.52
, pp. 119
-
-
Agresti, A.1
Coull, B.A.2
-
41
-
-
0001072895
-
The use of confidence or fiducial limits illustrated in the case of the binomial
-
C. Clopper and E. S. Pearson, "The use of confidence or fiducial limits illustrated in the case of the binomial," Biometrika 26(4), 404-413 (1934).
-
(1934)
Biometrika
, vol.26
, Issue.4
, pp. 404-413
-
-
Clopper, C.1
Pearson, E.S.2
-
42
-
-
34548394977
-
Symmetry of large physical systems implies independence of subsystems
-
R. Renner, "Symmetry of large physical systems implies independence of subsystems," Nat. Phys. 3(9), 645-649 (2007).
-
(2007)
Nat. Phys.
, vol.3
, Issue.9
, pp. 645-649
-
-
Renner, R.1
-
44
-
-
34547394809
-
High speed single photon detection in the near infrared
-
Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, "High speed single photon detection in the near infrared," Appl. Phys. Lett. 91(4), 041114 (2007).
-
(2007)
Appl. Phys. Lett.
, vol.91
, Issue.4
, pp. 041114
-
-
Yuan, Z.L.1
Kardynal, B.E.2
Sharpe, A.W.3
Shields, A.J.4
-
45
-
-
66449136283
-
Entangled quantum key distribution with a biased basis choice
-
C. Erven, X. Ma, R. Lãamme, and G. Weihs, "Entangled quantum key distribution with a biased basis choice," New J. Phys. 11(4), 045025 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.4
, pp. 045025
-
-
Erven, C.1
Ma, X.2
Lãamme, R.3
Weihs, G.4
-
46
-
-
34648836618
-
-
arXiv:0705.3081
-
J. Hasegawa, M. Hayashi, T. Hiroshima, A. Tanaka, and A. Tomita, "Experimental decoy state quantum key distribution with unconditional security incorporating finite statistics," arXiv:0705.3081 (2007).
-
(2007)
Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics
-
-
Hasegawa, J.1
Hayashi, M.2
Hiroshima, T.3
Tanaka, A.4
Tomita, A.5
-
47
-
-
66249106052
-
Practical long-distance quantum key distribution system using decoy levels
-
D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R. Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam, B. Baek, R. H. Hadfield, R. J. Hughes, and J. E. Nordholt, "Practical long-distance quantum key distribution system using decoy levels," New J. Phys. 11(4), 045009 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.4
, pp. 045009
-
-
Rosenberg, D.1
Peterson, C.G.2
Harrington, J.W.3
Rice, P.R.4
Dallmann, N.5
Tyagi, K.T.6
McCabe, K.P.7
Nam, S.8
Baek, B.9
Hadfield, R.H.10
Hughes, R.J.11
Nordholt, J.E.12
-
48
-
-
84877578573
-
Experimental demonstration of longdistance continuous-variable quantum key distribution
-
P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, "Experimental demonstration of longdistance continuous-variable quantum key distribution," Nat. Photonics 7(5), 378-381 (2013).
-
(2013)
Nat. Photonics
, vol.7
, Issue.5
, pp. 378-381
-
-
Jouguet, P.1
Kunz-Jacques, S.2
Leverrier, A.3
Grangier, P.4
Diamanti, E.5
|