利用诱骗信号方案进行实用的量子密钥分发
邹佩琳, 李晖. 利用诱骗信号方案进行实用的量子密钥分发[J]. 量子光学学报, 2008, 14(1): 24.
邹佩琳, 李晖. Practical Quantum Key Distribution with Decoy State Method[J]. Acta Sinica Quantum Optica, 2008, 14(1): 24.
[1] MAYERS D.Unconditional Security in Quantum Cryptography[J].Journal of the ACM,2001,48(3):351-406.
[2] SHOR P W,PRESKILL J.Simple Proof of Seeurtiy of the BB84 Quantum Key Distribution Protocol[J].Phys Rev Lett,2000,85:441-444.
[3] EKERT A K,HUTTNER B.Information Gain in Quantum Eavesdropping[J].J Mod opt,1994,41:24552466.
[4] id Quantique SA.Emerging Technogies That Will Change the World[N/OL].Business Week.July 2003.http://www.idquantique.com/news/news-Techreview.htm.
[5] BRASSARD G,LUTKENHAUS N,MOR T,et al.Limitation on Practical Quantum Cryptography[J].Phys Rev Lett,2000,8S:1330.
[6] HWANG W Y.Quantum Key Distribution with High Loss:toward Global Secure Communication[J].Phys Rev Lett,2003,91:057901.
[7] MA X F,QI B,ZHAO Y,et al.Practical Decoy State for Quantum Key Distribution[J].Phys Rev A,2005,72:012326.
[8] LO H K,MA X F,CHEN K.Decoy State Quantum Key Distribution[J].Phys Rev Lett,2005,94:230504.
[9] H.ARRINGTON J W,ETYINGER J M,HUGHES R J,et al.Enhancing Practical Security of QKD with a few Decoy States[EB/OL].http://arxiv.org/abs/quant-ph/0503002.
[10] WANG X B.Beating the Photon.number.splitting Attack in Practical Quantum Cryptography[J].Phys Rev Lett,2005,94:230503.
[11] WANG X B.Quantum Key Distribution with 4 Intensities of Coherent Light[J].Phys Rev A,2005,72:012322.
[12] ZHAO Y,QI B,MAX F,et al.Experimental Quantum Key Distribution with Decoy States[J].Phys Rev Lett,2006,96:070502.
[13] ZHAO Y,QI B,M A X F,et al.Simulation and Implementation of Decoy State Quantum Key Distribution over 60 km Telecom Fiber[EB/OL].http://arxiv,org/as/quant-ph/0601168.
[14] PENG C Z,ZHANG J,YANG D,et al.Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding[EB/OL]/ http://arxiv.org/abs/quant-ph/0607129.
[15] ROSENBERG D,HARRINGTON J W,RICE P R,et al.Long Distance Decoy State Quantum Key Distribution in Optical Fiber[EB/OL].http://arxiv,org/abs/quant-ph/0607186.
[16] MA X F,FUNG C H F,DUPUIS F,et al.Decoy state Quantum Key Distribution with two-way Classical Post-processing[EB/OL].http://arxiv.org/abs/quant-ph/0604094.
[17] WANG J,ZHANG Q,TANG C J.Quantum Secure Direct Communication with Pure Entangled States[EB/OL].http://arxiv.org/abs/quant-ph/0606236.
[18] LI J B,FANG X M.Nonorthogonal Decoy State QKD[EB/OL].http://arxiv,org/abs/quant-qh/0509077.
[19] DENG F G,LI X H,LI C Y,et al.Any-to-any Quantum Direct Communication with Superdense Coding and Decoy States[EB/OL].http:// arxiv. org/abs/quant-ph/0605214.
[20] NORBERT LUTKENHAUS.Security against Individual Attacks for Ralistic Quantum Key Distribution[J].Phys Rev A,2000,61:052304.
[21] GOTTESMAN D,LO H K,LUTKENHAUS N,et al.Security of Quantum Key Distribution with Imperfect Deviees[J].Quantum Information and Computation,2004,4:325-360.
[22] BENNETT C H,BRASSARD G.Quantum Cryptography:Public Key Distribution and Coin Tossing[C].Proceedings of the IEEE International Conference on Computer Systems and Signal Processing,Bangalore India,December 1984:175-179.
[23] LO H-K,CHAU H F,ARDEHALI M.Efficient Quantum Key Distribution Scheme and a Proof of its Unconditional Security[P].Journal of Cryptology,2005,18:133.
邹佩琳, 李晖. 利用诱骗信号方案进行实用的量子密钥分发[J]. 量子光学学报, 2008, 14(1): 24. 邹佩琳, 李晖. Practical Quantum Key Distribution with Decoy State Method[J]. Acta Sinica Quantum Optica, 2008, 14(1): 24.