Decoy state quantum key distribution with finite resources
From MaRDI portal
Publication:662985
DOI10.1016/J.PHYSLETA.2009.05.016zbMATH Open1231.81023OpenAlexW2084023682MaRDI QIDQ662985FDOQ662985
Linmei Liang, Shi-Hai Sun, Chengzu Li
Publication date: 13 February 2012
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2009.05.016
Cites Work
Cited In (5)
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Passive Decoy State Quantum Key Distribution
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- A comprehensive design and performance analysis of low Earth orbit satellite quantum communication
- Title not available (Why is that?)
Recommendations
- Title not available (Why is that?) 👍 👎
- Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution 👍 👎
- Fluctuation analysis of decoy state QKD with finite data-set size 👍 👎
- Analysis of decoy-state measurement-device-independent quantum key distribution system 👍 👎
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths 👍 👎
This page was built for publication: Decoy state quantum key distribution with finite resources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q662985)