-
1
-
-
0036013605
-
Quantum cryptography
-
Gisin, N. et al. Quantum cryptography. Rev. Mod. Phys. 74, 145-195 (2002).
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145-195
-
-
Gisin, N.1
-
2
-
-
70449402318
-
The security of practical quantum key distribution
-
Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301-1350 (2009).
-
(2009)
Rev. Mod. Phys.
, vol.81
, pp. 1301-1350
-
-
Scarani, V.1
-
3
-
-
33846202211
-
Time-shift attack in practical quantum cryptosystems
-
Qi, B. et al. Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7, 73-82 (2007).
-
(2007)
Quantum Inf. Comput.
, vol.7
, pp. 73-82
-
-
Qi, B.1
-
4
-
-
33947205243
-
Phase-remapping attack in practical quantum-keydistribution systems
-
Fung, C.-H. F. et al. Phase-remapping attack in practical quantum-keydistribution systems. Phys. Rev. A 75, 032314 (2007).
-
(2007)
Phys. Rev. A
, vol.75
, pp. 032314
-
-
Fung, C.-H.F.1
-
5
-
-
34547403333
-
Breaking a quantum key distribution system through a timing side channel
-
Lamas-Linares, A. & Kurtsiefer, C. Breaking a quantum key distribution system through a timing side channel. Opt. Express 15, 9388-9393 (2007).
-
(2007)
Opt. Express
, vol.15
, pp. 9388-9393
-
-
Lamas-Linares, A.1
Kurtsiefer, C.2
-
6
-
-
55049100546
-
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
-
Zhao, Y. et al. Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008).
-
(2008)
Phys. Rev. A
, vol.78
, pp. 042333
-
-
Zhao, Y.1
-
7
-
-
67650091527
-
Information leakage via side channels in freespace BB84 quantum cryptography
-
Nauerth, S. et al. Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11, 065001 (2009).
-
(2009)
New J. Phys.
, vol.11
, pp. 065001
-
-
Nauerth, S.1
-
8
-
-
78650161554
-
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
-
Xu, F., Qi, B. & Lo, H.-K. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010).
-
(2010)
New J. Phys.
, vol.12
, pp. 113026
-
-
Xu, F.1
Qi, B.2
Lo, H.-K.3
-
9
-
-
77957566438
-
Hacking commercial quantum cryptography systems by tailored bright illumination
-
Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686-689 (2010).
-
(2010)
Nat. Photon.
, vol.4
, pp. 686-689
-
-
Lydersen, L.1
-
10
-
-
79959230884
-
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
-
Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011).
-
(2011)
Nat. Commun.
, vol.2
, pp. 349
-
-
Gerhardt, I.1
-
11
-
-
79960775427
-
Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors
-
Weier, H. et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13, 073024 (2011).
-
(2011)
New J. Phys.
, vol.13
, pp. 073024
-
-
Weier, H.1
-
13
-
-
34547380185
-
Device-independent security of quantum cryptography against collective attacks
-
Acín, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 230501
-
-
Acín, A.1
-
14
-
-
66549107253
-
Device-independent quantum key distribution secure against collective attacks
-
Pironio, S. et al. Device-independent quantum key distribution secure against collective attacks. New J. Phys. 11, 045021 (2009).
-
(2009)
New J. Phys.
, vol.11
, pp. 045021
-
-
Pironio, S.1
-
15
-
-
72149091696
-
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
-
McKague, M. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. Phys. 11, 103037 (2009).
-
(2009)
New J. Phys.
, vol.11
, pp. 103037
-
-
McKague, M.1
-
16
-
-
79952712286
-
Secure device-independent quantum key distribution with causally independent measurement devices
-
Masanes, L., Pironio, S. & Acín, A. Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2, 238 (2011).
-
(2011)
Nat. Commun.
, vol.2
, pp. 238
-
-
Masanes, L.1
Pironio, S.2
Acín, A.3
-
17
-
-
84871796284
-
Memory attacks on device-independent quantum cryptography
-
Barrett, J., Colbeck, R. & Kent, A. Memory attacks on device-independent quantum cryptography. Phys. Rev. Lett. 110, 010503 (2013).
-
(2013)
Phys. Rev. Lett.
, vol.110
, pp. 010503
-
-
Barrett, J.1
Colbeck, R.2
Kent, A.3
-
18
-
-
0000486090
-
On the einstein-podolsky-rosen paradox
-
Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964).
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
19
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
Clauser, J. F. et al. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884 (1969).
-
(1969)
Phys. Rev. Lett.
, vol.23
, pp. 880-884
-
-
Clauser, J.F.1
-
20
-
-
33746933894
-
Hidden-variable example based upon data rejection
-
Pearle, P. Hidden-variable example based upon data rejection. Phys. Rev. D 2, 1418-1425 (1970).
-
(1970)
Phys. Rev. D
, vol.2
, pp. 1418-1425
-
-
Pearle, P.1
-
21
-
-
77955640378
-
Proposal for implementing deviceindependent quantum key distribution based on a heralded qubit amplifier
-
Gisin, N., Pironio, S. & Sangouard, N. Proposal for implementing deviceindependent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105, 070501 (2010).
-
(2010)
Phys. Rev. Lett.
, vol.105
, pp. 070501
-
-
Gisin, N.1
Pironio, S.2
Sangouard, N.3
-
22
-
-
79961079184
-
Heralded-qubit amplifiers for practical deviceindependent quantum key distribution
-
Curty, M. & Moroder, T. Heralded-qubit amplifiers for practical deviceindependent quantum key distribution. Phys. Rev. A 84, 010304(R) (2011).
-
(2011)
Phys. Rev. A
, vol.84
, pp. 010304
-
-
Curty, M.1
Moroder, T.2
-
23
-
-
84859361763
-
Measurement-device-independent quantum key distribution
-
Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
-
(2012)
Phys. Rev. Lett.
, vol.108
, pp. 130503
-
-
Lo, H.-K.1
Curty, M.2
Qi, B.3
-
24
-
-
84884679606
-
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks
-
Rubenok, A. et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013).
-
(2013)
Phys. Rev. Lett.
, vol.111
, pp. 130501
-
-
Rubenok, A.1
-
25
-
-
84887554168
-
Proof-of-principle demonstration of measurement device independent QKD using polarization qubits
-
Ferreira da Silva, T. et al. Proof-of-principle demonstration of measurement device independent QKD using polarization qubits. Phys. Rev. A 88, 052303 (2013).
-
(2013)
Phys. Rev. A
, vol.88
, pp. 052303
-
-
Ferreira Da-Silva, T.1
-
26
-
-
84884686328
-
Experimental measurement-device-independent quantum key distribution
-
Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013).
-
(2013)
Phys. Rev. Lett.
, vol.111
, pp. 130502
-
-
Liu, Y.1
-
28
-
-
3142519923
-
Entanglement as a precondition for secure quantum key distribution
-
Curty, M., Lewenstein, M. & Lütkenhaus, N. Entanglement as a precondition for secure quantum key distribution. Phys. Rev. Lett. 92, 217903 (2004).
-
(2004)
Phys. Rev. Lett.
, vol.92
, pp. 217903
-
-
Curty, M.1
Lewenstein, M.2
Lütkenhaus, N.3
-
29
-
-
84888383118
-
Device-independent quantum key distribution with local bell test
-
Lim, C. C. W. et al. Device-Independent quantum key distribution with local Bell test. Phys. Rev. X 3, 031006 (2013).
-
(2013)
Phys. Rev. X
, vol.3
, pp. 031006
-
-
Lim, C.C.W.1
-
30
-
-
84865644244
-
Finite-key analysis for measurement-device-independent quantum key distribution
-
Song, T.-T. et al. Finite-key analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 022332 (2012).
-
(2012)
Phys. Rev. A
, vol.86
, pp. 022332
-
-
Song, T.-T.1
-
31
-
-
84868359581
-
Statistical fluctuation analysis for measurement-device-independent quantum key distribution
-
Ma, X., Fung, C.-H. F. & Razavi, M. Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012).
-
(2012)
Phys. Rev. A
, vol.86
, pp. 052305
-
-
Ma, X.1
Fung, C.-H.F.2
Razavi, M.3
-
32
-
-
84856702807
-
Tight finite-key analysis for quantum cryptography
-
Tomamichel, M., Lim, C. C.W., Gisin, N. & Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012).
-
(2012)
Nat. Commun.
, vol.3
, pp. 634
-
-
Tomamichel, M.1
Lim, C.C.W.2
Gisin, N.3
Renner, R.4
-
33
-
-
84884145066
-
Experimental quantum key distribution with finite-key security analysis for noisy channels
-
Bacco, D., Canale, M., Laurenti, N., Vallone, G. & Villoresi, P. Experimental quantum key distribution with finite-key security analysis for noisy channels. Nat. Commun. 4, 2363 (2013).
-
(2013)
Nat. Commun.
, vol.4
, pp. 2363
-
-
Bacco, D.1
Canale, M.2
Laurenti, N.3
Vallone, G.4
Villoresi, P.5
-
34
-
-
84894501687
-
Concise security bounds for practical decoy-state quantum key distribution
-
Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014).
-
(2014)
Phys. Rev. A
, vol.89
, pp. 022307
-
-
Lim, C.C.W.1
Curty, M.2
Walenta, N.3
Xu, F.4
Zbinden, H.5
-
36
-
-
69249154272
-
Composability in quantum cryptography
-
Müller-Quade, J. & Renner, R. Composability in quantum cryptography. New J. Phys. 11, 085006 (2009).
-
(2009)
New J. Phys.
, vol.11
, pp. 085006
-
-
Müller-Quade, J.1
Renner, R.2
-
37
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
Chernoff, H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493-507 (1952).
-
(1952)
Ann. Math. Stat.
, vol.23
, pp. 493-507
-
-
Chernoff, H.1
-
38
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
39
-
-
27744479495
-
Decoy state quantum key distribution
-
Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
40
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
42
-
-
84928045174
-
Quantum cryptographic network based on quantum memories
-
Biham, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651-2658 (1996).
-
(1996)
Phys. Rev. A
, vol.54
, pp. 2651-2658
-
-
Biham, E.1
Huttner, B.2
Mor, T.3
-
43
-
-
0141922765
-
Security of practical time-reversed EPR quantum key distribution
-
Inamori, H. Security of practical time-reversed EPR quantum key distribution. Algorithmica 34, 340-365 (2002).
-
(2002)
Algorithmica
, vol.34
, pp. 340-365
-
-
Inamori, H.1
-
44
-
-
0001619342
-
Estimates for practical quantum cryptography
-
Lütkenhaus, N. Estimates for practical quantum cryptography. Phys. Rev. A 59, 3301-3319 (1999).
-
(1999)
Phys. Rev. A
, vol.59
, pp. 3301-3319
-
-
Lütkenhaus, N.1
-
45
-
-
84972574511
-
Weighted sums of certain dependent random variables
-
Azuma, K. Weighted sums of certain dependent random variables. Tôhoku Math. J. 19, 357-367 (1967).
-
(1967)
Tôhoku Math. J.
, vol.19
, pp. 357-367
-
-
Azuma, K.1
-
47
-
-
34547480312
-
Entanglement-based quantum communication over 144 km
-
Ursin, R. et al. Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481-486 (2007).
-
(2007)
Nat. Phys.
, vol.3
, pp. 481-486
-
-
Ursin, R.1
-
48
-
-
84888335947
-
Practical aspects of measurement-device-independent quantum key distribution
-
Xu, F. et al. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 15, 113007 (2013).
-
(2013)
New J. Phys.
, vol.15
, pp. 113007
-
-
Xu, F.1
-
49
-
-
72449202040
-
Single-photon detectors for optical quantum information applications
-
Hadfield, R. H. Single-photon detectors for optical quantum information applications. Nat. Photon. 3, 696-705 (2009).
-
(2009)
Nat. Photon.
, vol.3
, pp. 696-705
-
-
Hadfield, R.H.1
-
50
-
-
84874595936
-
Detecting single infrared photons with 93% system efficiency
-
Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210-214 (2013).
-
(2013)
Nat. Photon.
, vol.7
, pp. 210-214
-
-
Marsili, F.1
-
51
-
-
0001899764
-
Probability inequalities for the sum in sampling without replacement
-
Serfling, R. J. Probability inequalities for the sum in sampling without replacement. Ann. Statist. 2, 39-48 (1974).
-
(1974)
Ann. Statist.
, vol.2
, pp. 39-48
-
-
Serfling, R.J.1
-
52
-
-
77955759356
-
Duality between smooth min- and max-entropies
-
Tomamichel, M., Colbeck, R. & Renner, R. Duality between smooth min- and max-entropies. IEEE Trans. Inf. Theory 54, 4674-4681 (2010).
-
(2010)
IEEE Trans. Inf. Theory
, vol.54
, pp. 4674-4681
-
-
Tomamichel, M.1
Colbeck, R.2
Renner, R.3
-
53
-
-
84876767474
-
Chain rules for smooth min- and max-entropies
-
Vitanov, A., Dupuis, F., Tomamichel, M. & Renner, R. Chain rules for smooth min- and max-entropies. IEEE Trans. Inf. Theory 59, 2603-2612 (2013).
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, pp. 2603-2612
-
-
Vitanov, A.1
Dupuis, F.2
Tomamichel, M.3
Renner, R.4
|