Acta Photonica Sinica, Volume. 41, Issue 3, 339(2012)

The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy

LI Chao1,*... NIE Min1, and LIU Xiao-hui12 |Show fewer author(s)
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(13)

    [1] [1] ZHAO Yi, QI Bing, MA Xiong-feng, et al. Experimental quantum key distribution with decoy states[J]. Physical Review Letters, 2006, 96(7): 070502-1-070502-4.

    [2] [2] QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua, et al .New method of decoy state quantum key distribution with a heralded single-photon source[J]. Acta Physica Sinica, 2008, 57(9): 5600-5604.

    [4] [4] LIU D, PEI C X, QUAN D X, et al. A new quantum secure direct communication scheme with authentication[J]. Chinese Physics Letters, 2010, 27(5): 306

    [5] [5] CHEN Zhi-xin, TANG Zhi-lie, LIAO Chang-jun, et al. Practical security problem of six states Q KD protocol[J].Acta Physica Sinica, 2006, 35(1): 126-129.

    [6] [6] BRASSARD G, LTKENHAUS N, MOR T, et al. Limitations on pratical quantum cryptography[J]. Physical Review Letters, 2000, 85(6): 1330-1333.

    [7] [7] MO X F, ZHU B, HAN Z F, et al. Faraday-Michelson system for quantum cryptography[J].Optics Letters, 2005, 30(19): 2632-2634.

    [8] [8] YUAN Z L, SHIELDS A J. Continuous operation of a one-way quantum key distribution system over installed telecom fibre[J]. Optics Express, 2005, 13(2): 660-665.

    [9] [9] HU J Z, WANG X B. Reexamination of the decoy-state quantum key distribution with an unstable source[J]. Physical Review A, 2010, 82(1): 012331.

    [10] [10] WANG X B, PENG C Z, ZHANG J, et al. General theory of decoy-state quantum cryp tography with source errors[J]. Physical Review A, 2008, 77(4): 42311.

    [11] [11] PENG C Z, ZHANG J, YANG D. Experimental long-distance decoy-state quantum key distribution based on polarization encoding[J]. Physical Review Letters, 2007, 98(1): 10505.

    [12] [12] SCHM ITT-MANDERBACH T. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km[J]. Physical Review Letters, 2007, 98(1): 10504.

    [13] [13] WANG X B, PENG C Z, PAN J W. Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source[J]. Applied Physics Letters, 2007, 90(3): 031110.

    Tools

    Get Citation

    Copy Citation Text

    LI Chao, NIE Min, LIU Xiao-hui. The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(3): 339

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Received: Nov. 22, 2011

    Accepted: --

    Published Online: Mar. 30, 2012

    The Author Email: Chao LI (lc32514@163.com)

    DOI:10.3788/gzxb20124103.0339

    Topics