Author:
Mu Qingxia,Liu Jiawei,Wang Qingle,Li Guodong,Sun Wenqi
Funder
China Key Lab of Information Network Security, Ministry of Public Security
Publisher
Springer Science and Business Media LLC
Reference46 articles.
1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
2. Wang, G., França, D.S., Zhang, R., Zhu, S., Johnson, P.D.: Quantum algorithm for ground state energy estimation using circuit depth with exponentially improved dependence on precision. Quantum 7, 1167 (2023)
3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. arXiv:2003.06557 (2020)
4. Zapatero, V., Leent, T., Arnon-Friedman, R., Liu, W.-Z., Zhang, Q., Weinfurter, H., Curty, M.: Advances in device-independent quantum key distribution. npj Quantum Inf. 9(1), 10 (2023)
5. Wang, W., Wang, R., Hu, C., Zapatero, V., Qian, L., Qi, B., Curty, M., Lo, H.-K.: Fully passive quantum key distribution. Phys. Rev. Lett. 130(22), 220801 (2023)