Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
about
Security of two quantum cryptography protocols using the same four qubit statesLocalized Closed Timelike Curves Can Perfectly Distinguish Quantum StatesQuantum key distribution with hacking countermeasures and long term field trial.Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.Practical quantum key distribution protocol without monitoring signal disturbance.Security of quantum key distribution with multiphoton componentsTwo Quantum Protocols for Oblivious Set-member Decision Problem.Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key DistributionLoss-tolerant measurement-device-independent quantum private queries.Round-robin differential-phase-shift quantum key distribution with a passive decoy state methodChip-based quantum key distribution.Practical passive decoy state measurement-device-independent quantum key distribution with unstable sourcesInvisible Trojan-horse attack.The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication.Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocolPerforming private database queries in a real-world environment using a quantum protocolUnconditional security of coherent-state quantum key distribution with a strong phase-reference pulse.Quantum key distribution with classical Bob.Quantum cloningHigher-dimensional orbital-angular-momentum-based quantum key distribution with mutually unbiased basesA Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange SystemSemiquantum key distribution without invoking the classical party’s measurement capability
P2860
Q21708958-19B45C5C-8E8F-4189-956A-05D29064EE13Q27343121-79B3210E-F6AE-4948-923E-0C2F0C3E5146Q33694738-35DFAC94-8CD9-4473-8E10-84DA909CA7DDQ33729814-B1397FA5-33F7-43C7-A201-08E817CDAFD0Q35171961-EF1E03C1-7538-46D8-8B39-71BEAE70A6B0Q36068793-CB873855-300C-40F4-8F6C-2CA414C8E8DAQ36227249-9E91B654-746E-4670-91BF-D6F90368127CQ37189077-F66DED5E-6CFA-4622-8D76-82E798866B54Q37554415-489479F0-22CB-4C5A-82A5-9C49D14B031DQ37637965-3AB77B02-B1ED-4279-80E7-FC7A43CD7344Q38759488-363EF175-D32C-4A84-B10B-05070DE1E620Q41195570-B805357C-C7B4-48B8-9A84-94C95EBF1915Q41487586-E407F84C-1FC1-4D49-938D-01492BFC0E35Q41539916-422011C2-AA28-4977-B631-88B028156FD4Q41677810-E0AEF1DB-6130-45DF-A89B-EF6436310BD1Q42058512-301300B0-0B51-42F5-85B8-0E743DBC032BQ51609702-CBDF6323-7BBF-421D-B478-1D7D583DFD96Q51625096-3B688928-4ADB-477D-9696-DAAF9B323349Q52990742-55C49BD6-EF79-44BC-8004-932276F83589Q57891629-3C404023-6402-4B29-BD84-9CFF58954B26Q59147975-66CAB485-EA94-4BD5-99AC-6CB7819D1B8CQ59196621-8A5544EC-8BE4-45EF-966F-34B985527A1A
P2860
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
description
2004 nî lūn-bûn
@nan
2004年の論文
@ja
2004年学术文章
@wuu
2004年学术文章
@zh-cn
2004年学术文章
@zh-hans
2004年学术文章
@zh-my
2004年学术文章
@zh-sg
2004年學術文章
@yue
2004年學術文章
@zh
2004年學術文章
@zh-hant
name
Quantum cryptography protocols ...... k laser pulse implementations.
@en
Quantum cryptography protocols ...... k laser pulse implementations.
@nl
type
label
Quantum cryptography protocols ...... k laser pulse implementations.
@en
Quantum cryptography protocols ...... k laser pulse implementations.
@nl
prefLabel
Quantum cryptography protocols ...... k laser pulse implementations.
@en
Quantum cryptography protocols ...... k laser pulse implementations.
@nl
P2093
P2860
P1476
Quantum cryptography protocols ...... k laser pulse implementations.
@en
P2093
Antonio Acín
Grégoire Ribordy
Valerio Scarani
P2860
P304
P356
10.1103/PHYSREVLETT.92.057901
P407
P577
2004-02-06T00:00:00Z
P698
P818
quant-ph/0211131