Practical covert quantum key distribution with decoy-state method
From MaRDI portal
Publication:670022
Recommendations
- Decoy state quantum-key-distribution by using odd coherent states without monitoring signal disturbance
- Passive Decoy State Quantum Key Distribution
- Fluctuation analysis of decoy state QKD with finite data-set size
- Decoy state quantum key distribution with dual detectors heralded single photon source
- Decoy state quantum key distribution with finite resources
Cites work
- scientific article; zbMATH DE number 5989869 (Why is no real title available?)
- scientific article; zbMATH DE number 2107836 (Why is no real title available?)
- Algorithm 715: SPECFUN–a portable FORTRAN package of special function routines and test drivers
- Quantum cryptography
- Quantum cryptography: public key distribution and coin tossing
- Security of quantum key distribution with imperfect devices
Cited in
(7)- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- AN EFFICIENT QUANTUM SECRET SHARING SCHEME WITH DECOY STATES
- An enhanced proposal on decoy-state measurement device-independent quantum key distribution
- Passive Decoy State Quantum Key Distribution
- A method of enciphering quantum states
- scientific article; zbMATH DE number 5989869 (Why is no real title available?)
- Novel controlled quantum dialogue protocols without information leakage
This page was built for publication: Practical covert quantum key distribution with decoy-state method
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q670022)