Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
-
Published:2024-01-29
Issue:2
Volume:23
Page:
-
ISSN:1573-1332
-
Container-title:Quantum Information Processing
-
language:en
-
Short-container-title:Quantum Inf Process
Author:
Li Zijian, Zheng Bingbing, Zhang Chengxian, Zhang Zhenrong, Xie Hong-Bo, Wei KejinORCID
Publisher
Springer Science and Business Media LLC
Reference65 articles.
1. Bennett , C.H., Brassard, G. et al.: In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Quantum cryptography: Public Key Distribution and Coin Tossing. vol. 175, New York (1984) 2. Wang, S., Chen, W., Guo, J.-F., Yin, Z.-Q., Li, H.-W., Zhou, Z., Guo, G.-C., Han, Z.-F.: 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37, 1008 (2012) 3. Cañas, G., Vera, N., Cariñe, J., González, P., Cardenas, J., Connolly, P.W.R., Przysiezna, A., Gómez, E.S., Figueroa, M., Vallone, G., Villoresi, P., da Silva, T.F., Xavier, G.B., Lima, G.: High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers. Phys. Rev. A 96, 022317 (2017) 4. Islam, N.T., Lim, C.C.W., Cahall, C., Kim, J., Gauthier, D.J.: Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3, e1701491 (2017) 5. Yuan, Z., Plews, A., Takahashi, R., Doi, K., Tam, W., Sharpe, A., Dixon, A., Lavelle, E., Dynes, J., Murakami, A., Kujiraoka, M., Lucamarini, M., Tanizawa, Y., Sato, H., Shields, A.J.: 10-Mb/s quantum key distribution. Lightw. Technol. 36, 3427 (2018)
|
|