量子光学学报, 2008, 14 (1): 24, 网络出版: 2008-08-17  

利用诱骗信号方案进行实用的量子密钥分发

Practical Quantum Key Distribution with Decoy State Method
作者单位
西安电子科技大学计算机网络与信息安全教育部重点实验室,陕西,西安,710071
引用该论文

邹佩琳, 李晖. 利用诱骗信号方案进行实用的量子密钥分发[J]. 量子光学学报, 2008, 14(1): 24.

邹佩琳, 李晖. Practical Quantum Key Distribution with Decoy State Method[J]. Acta Sinica Quantum Optica, 2008, 14(1): 24.

参考文献

[1] MAYERS D.Unconditional Security in Quantum Cryptography[J].Journal of the ACM,2001,48(3):351-406.

[2] SHOR P W,PRESKILL J.Simple Proof of Seeurtiy of the BB84 Quantum Key Distribution Protocol[J].Phys Rev Lett,2000,85:441-444.

[3] EKERT A K,HUTTNER B.Information Gain in Quantum Eavesdropping[J].J Mod opt,1994,41:24552466.

[4] id Quantique SA.Emerging Technogies That Will Change the World[N/OL].Business Week.July 2003.http://www.idquantique.com/news/news-Techreview.htm.

[5] BRASSARD G,LUTKENHAUS N,MOR T,et al.Limitation on Practical Quantum Cryptography[J].Phys Rev Lett,2000,8S:1330.

[6] HWANG W Y.Quantum Key Distribution with High Loss:toward Global Secure Communication[J].Phys Rev Lett,2003,91:057901.

[7] MA X F,QI B,ZHAO Y,et al.Practical Decoy State for Quantum Key Distribution[J].Phys Rev A,2005,72:012326.

[8] LO H K,MA X F,CHEN K.Decoy State Quantum Key Distribution[J].Phys Rev Lett,2005,94:230504.

[9] H.ARRINGTON J W,ETYINGER J M,HUGHES R J,et al.Enhancing Practical Security of QKD with a few Decoy States[EB/OL].http://arxiv.org/abs/quant-ph/0503002.

[10] WANG X B.Beating the Photon.number.splitting Attack in Practical Quantum Cryptography[J].Phys Rev Lett,2005,94:230503.

[11] WANG X B.Quantum Key Distribution with 4 Intensities of Coherent Light[J].Phys Rev A,2005,72:012322.

[12] ZHAO Y,QI B,MAX F,et al.Experimental Quantum Key Distribution with Decoy States[J].Phys Rev Lett,2006,96:070502.

[13] ZHAO Y,QI B,M A X F,et al.Simulation and Implementation of Decoy State Quantum Key Distribution over 60 km Telecom Fiber[EB/OL].http://arxiv,org/as/quant-ph/0601168.

[14] PENG C Z,ZHANG J,YANG D,et al.Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding[EB/OL]/ http://arxiv.org/abs/quant-ph/0607129.

[15] ROSENBERG D,HARRINGTON J W,RICE P R,et al.Long Distance Decoy State Quantum Key Distribution in Optical Fiber[EB/OL].http://arxiv,org/abs/quant-ph/0607186.

[16] MA X F,FUNG C H F,DUPUIS F,et al.Decoy state Quantum Key Distribution with two-way Classical Post-processing[EB/OL].http://arxiv.org/abs/quant-ph/0604094.

[17] WANG J,ZHANG Q,TANG C J.Quantum Secure Direct Communication with Pure Entangled States[EB/OL].http://arxiv.org/abs/quant-ph/0606236.

[18] LI J B,FANG X M.Nonorthogonal Decoy State QKD[EB/OL].http://arxiv,org/abs/quant-qh/0509077.

[19] DENG F G,LI X H,LI C Y,et al.Any-to-any Quantum Direct Communication with Superdense Coding and Decoy States[EB/OL].http:// arxiv. org/abs/quant-ph/0605214.

[20] NORBERT LUTKENHAUS.Security against Individual Attacks for Ralistic Quantum Key Distribution[J].Phys Rev A,2000,61:052304.

[21] GOTTESMAN D,LO H K,LUTKENHAUS N,et al.Security of Quantum Key Distribution with Imperfect Deviees[J].Quantum Information and Computation,2004,4:325-360.

[22] BENNETT C H,BRASSARD G.Quantum Cryptography:Public Key Distribution and Coin Tossing[C].Proceedings of the IEEE International Conference on Computer Systems and Signal Processing,Bangalore India,December 1984:175-179.

[23] LO H-K,CHAU H F,ARDEHALI M.Efficient Quantum Key Distribution Scheme and a Proof of its Unconditional Security[P].Journal of Cryptology,2005,18:133.

邹佩琳, 李晖. 利用诱骗信号方案进行实用的量子密钥分发[J]. 量子光学学报, 2008, 14(1): 24. 邹佩琳, 李晖. Practical Quantum Key Distribution with Decoy State Method[J]. Acta Sinica Quantum Optica, 2008, 14(1): 24.

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!