메뉴 건너뛰기




Volumn 21, Issue 22, 2013, Pages 27260-27268

Entanglement-based quantum key distribution with biased basis choice via free space

Author keywords

[No Author keywords available]

Indexed keywords

BB84 PROTOCOL; CONTINUOUS OPERATION; FREE SPACES; FREE-SPACE OPTICAL LINK; KEY GENERATION; PHOTON PAIRS; POST-PROCESSING SCHEME;

EID: 84887430475     PISSN: None     EISSN: 10944087     Source Type: Journal    
DOI: 10.1364/OE.21.027260     Document Type: Conference Paper
Times cited : (46)

References (35)
  • 2
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, 3121-3124 (1992).
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 3
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett. 67, 661-663 (1991).
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 4
    • 11944263767 scopus 로고
    • Quantum cryptography without Bell's theorem
    • C. H. Bennett, G. Brassard, and N. D. Mermin, "Quantum cryptography without Bell's theorem," Phys. Rev. Lett. 68, 557-559 (1992).
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 7
    • 56149113102 scopus 로고    scopus 로고
    • Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate
    • A. R. Dixon, Z. L. Yuan, J. F. Dynes, A.W. Sharpe and A. J. Shields, "Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate," Opt. Express 16, 18790-18979 (2008).
    • (2008) Opt. Express , vol.16 , pp. 18790-18979
    • Dixon, A.R.1    Yuan, Z.L.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 8
    • 66249147896 scopus 로고    scopus 로고
    • Practical gigahertz quantum key distribution based on avalanche photodiodes
    • Z. L. Yuan, A. R. Dixon, J. F. Dynes, A.W. Sharpe, and A. J. Shields, "Practical gigahertz quantum key distribution based on avalanche photodiodes," New J. Phys. 11, 045019 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 045019
    • Yuan, Z.L.1    Dixon, A.R.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 14
    • 54249093720 scopus 로고    scopus 로고
    • Entangled quantum key distribution over two free-space optical links
    • C. Erven, C. Couteau, R. Laflamme, and G. Weihs, "Entangled quantum key distribution over two free-space optical links," Opt. Express 16, 16840-16853 (2008).
    • (2008) Opt. Express , vol.16 , pp. 16840-16853
    • Erven, C.1    Couteau, C.2    Laflamme, R.3    Weihs, G.4
  • 19
    • 17444398022 scopus 로고    scopus 로고
    • Efficient quantum key distribution scheme and a proof of its unconditional security
    • H.-K. Lo, H. F. Chau, M. Ardehali "Efficient quantum key distribution scheme and a proof of its unconditional security," Journal of Cryptology 18, 133-165 (2005).
    • (2005) Journal of Cryptology , vol.18 , pp. 133-165
    • Lo, H.-K.1    Chau, H.F.2    Ardehali, M.3
  • 20
    • 66449136283 scopus 로고    scopus 로고
    • Entangled quantum key distribution with a biased basis choice
    • C. Erven, X. Ma, R. Laflamme, and G. Weihs, "Entangled quantum key distribution with a biased basis choice," New J. Phys. 11, 045025 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 045025
    • Erven, C.1    Ma, X.2    Laflamme, R.3    Weihs, G.4
  • 21
    • 79955474822 scopus 로고    scopus 로고
    • Universally composable and customizable post-processing for practical quantum key distribution
    • X. Ma, C.-H. F. Fung, J.-C. Boileau, and H.F. Chau, "Universally composable and customizable post-processing for practical quantum key distribution," Computers & Security 30, 172-177 (2011).
    • (2011) Computers & Security , vol.30 , pp. 172-177
    • Ma, X.1    Fung, C.-H.F.2    Boileau, J.-C.3    Chau, H.F.4
  • 22
    • 74949135913 scopus 로고    scopus 로고
    • Practical issues in quantum-key-distribution postprocessing
    • C.-H. F. Fung, X. Ma, and H. F. Chau, "Practical issues in quantum-key-distribution postprocessing," Phys. Rev. A 81, 012318 (2010).
    • (2010) Phys. Rev. A , vol.81 , pp. 012318
    • Fung, C.-H.F.1    Ma, X.2    Chau, H.F.3
  • 24
    • 0037422980 scopus 로고    scopus 로고
    • Secure quantum key distribution with an uncharacterized source
    • M. Koashi and J. Preskill, "Secure quantum key distribution with an uncharacterized source," Phys. Rev. Lett. 90, 057902 (2003).
    • (2003) Phys. Rev. Lett. , vol.90 , pp. 057902
    • Koashi, M.1    Preskill, J.2
  • 26
    • 79956299590 scopus 로고    scopus 로고
    • Chinese academy takes space under its wing
    • H. Xin, "Chinese academy takes space under its wing," Science 332, 904 (2011).
    • (2011) Science , vol.332 , pp. 904
    • Xin, H.1
  • 27
    • 84887478707 scopus 로고    scopus 로고
    • Entangled secret messages from space
    • R. Stone, "Entangled Secret Messages From Space," Science 336, 1632 (2012).
    • (2012) Science , vol.336 , pp. 1632
    • Stone, R.1
  • 31
    • 33846202211 scopus 로고    scopus 로고
    • Time-shift attack in practical quantum cryptosystems
    • B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, "Time-shift attack in practical quantum cryptosystems," Quantum Inf. Comput. 7, 073 (2007).
    • (2007) Quantum Inf. Comput. , vol.7 , pp. 73
    • Qi, B.1    Fung, C.-H.F.2    Lo, H.-K.3    Ma, X.4
  • 32
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking: Experimental demonstration of timeshift attack against practical quantum-key-distribution systems
    • Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, "Quantum hacking: Experimental demonstration of timeshift attack against practical quantum-key-distribution systems," Phys. Rev. A 78, 042333 (2008).
    • (2008) Phys. Rev. A , vol.78 , pp. 042333
    • Zhao, Y.1    Fung, C.-H.F.2    Qi, B.3    Chen, C.4    Lo, H.-K.5
  • 33
    • 33846365694 scopus 로고    scopus 로고
    • Effects of detector efficiency mismatch on security of quantum cryptosystems
    • V. Makarov, A. Anisimov, and J. Skaar, "Effects of detector efficiency mismatch on security of quantum cryptosystems," Phys. Rev. A 74, 022313 (2006).
    • (2006) Phys. Rev. A , vol.74 , pp. 022313
    • Makarov, V.1    Anisimov, A.2    Skaar, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.