Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states
From MaRDI portal
Publication:3522650
zbMATH Open1152.81701arXivquant-ph/0609094MaRDI QIDQ3522650FDOQ3522650
Authors:
Publication date: 3 September 2008
Full work available at URL: https://arxiv.org/abs/quant-ph/0609094
Recommendations
- Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states
- Upper bounds on the performance of differential-phase-shift quantum key distribution
- Active beam splitting attack applied to differential phase shift quantum key distribution protocol
- scientific article
- Analysis of differential-phase-shift keying protocol for a two-way quantum-key-distribution system
Cited In (6)
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Upper bounds on the performance of differential-phase-shift quantum key distribution
- Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states
- Active beam splitting attack applied to differential phase shift quantum key distribution protocol
- Geometrical analysis of physically allowed quantum cloning transformations for quantum cryptography
- Unambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single Photons
This page was built for publication: Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3522650)