Decoy state quantum key distribution with finite resources
From MaRDI portal
Publication:662985
DOI10.1016/J.PHYSLETA.2009.05.016zbMATH Open1231.81023OpenAlexW2084023682MaRDI QIDQ662985FDOQ662985
Authors: Shi-Hai Sun, Linmei Liang, Chengzu Li
Publication date: 13 February 2012
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2009.05.016
Recommendations
- scientific article
- Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
- Fluctuation analysis of decoy state QKD with finite data-set size
- Analysis of decoy-state measurement-device-independent quantum key distribution system
- Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
Cites Work
Cited In (9)
- Weak + Vacuum and one decoy states with two way quantum key distribution protocol
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Exact minimum and maximum of yield with a finite number of decoy light intensities
- Fluctuation analysis of decoy state QKD with finite data-set size
- Passive Decoy State Quantum Key Distribution
- Security Bounds for Quantum Cryptography with Finite Resources
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- A comprehensive design and performance analysis of low Earth orbit satellite quantum communication
- Title not available (Why is that?)
This page was built for publication: Decoy state quantum key distribution with finite resources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q662985)