Optoelectronics Letters, Volume. 8, Issue 5, 384(2012)
Practical decoy-state quantum key distribution method considering dark count rate fluctuation
[1] [1] Bennett C. H. and Brassard G., Quantum Cryptography: PublicKey Distribution and Coin Tossing, IEEE InternationalConference on Computer, Systems and Signals Processing,175 (1984).
[2] [2] Lo H. K. and Chau H. F., Science 283, 2050 (1999).
[3] [3] Mayers D., Proc. of Crypto. 96, 343 (1996).
[4] [4] Shor P. W. and Preskill J., Phys. Rev. Lett. 85, 441 (2000).
[5] [5] Lütkenhaus N., Phys. Rev. A 61, 052304 (2000).
[6] [6] Tamaki K., Lütkenhaus N. and Koashi M., Phys. Rev. A 80,032302 (2009).
[7] [7] Gottesman D., Lo H. K., Lütkenhaus N. and Preskill J., Quantum Inform. Comput. 4, 325 (2004).
[8] [8] Hwang W. Y., Phys. Rev. Lett. 91, 057901 (2003).
[9] [9] Lo H. K., Ma X. F. and Chen K., Phys. Rev. Lett. 94, 230504(2005).
[10] [10] Wang X. B., Phys. Rev. Lett. 94, 230503 (2005).
[11] [11] Wang X. B., Phys. Rev. A 72, 012322 (2005).
[12] [12] Peng C. Z., Zhang J., Yang D., Gao W. B., Ma H. X., Yin H.,Zeng H. P., Yang T., Wang X. B. and Pan J. W., Phys. Rev.Lett. 98, 010505 (2007).
[13] [13] Adachi Y., Yamamoto T., Koashi M. and Imoto N., Phys. Rev. Lett. 99, 180503 (2007).
[14] [14] Wang J., Zhang H. F., Wan X., Gao Y., Cui K., Cai W. Q.,Chen T. Y., Liang W. and Jin G., Journal of Optoelectronics Laser 21, 861 (2010). (in Chinese)
[15] [15] Yin Z. Q., Han Z. F., Chen W., Xu F. X., Wu Q. L. and GuoG. C., Chin. Phys. Lett. 25, 3547 (2008).
[16] [16] Zhou Y. Y., Zhou X. J. and Gao J., Optoelectron. Lett. 6,396 (2010).
[17] [17] Zhou Y. Y. and Zhou X. J., Optoelectron. Lett. 7, 389 (2011).
[18] [18] Hu H. P., Wang J. D., Huang Y. X., Liu S. H. and Lu W.,Acta Phys. Sin. 59, 287 (2010). (in Chinese)
[19] [19] Curty M., Moroder T., Ma X. F. and Lütkenhaus N., Phys.Rev. A 79, 032335 (2009).
[20] [20] Curty M., Ma X. F., Qi B. and Moroder T., Phys. Rev. A 81,022310 (2010).
[21] [21] Xu F. X., Wang S., Han Z. F. and Guo G. C., Chin. Phys. B 19, 100312 (2010).
[22] [22] Wang X. B., Phys. Rev. A 75, 052301 (2007).
[23] [23] Wang X. B., PENG C. Z. and PAN J. W., Appl. Phys. Lett.90, 031110 (2007).
[24] [24] Wang X. B., Peng C. Z., Zhang J., Yang L. and Pan J. W.,Phys. Rev. A 77, 042311 (2008).
[25] [25] Hu J. Z. and Wang X. B., Phys. Rev. A 82, 012331 (2010).
[26] [26] Gao X., Sun S. H. and Liang L. M., Chin. Phys. Lett. 26, 100307(2009).
[27] [27] Zhang S. L., Zou X. B., Li K., Jin C. H. and Guo G. C., Phys. Rev. A 76, 044304 (2007).
[28] [28] Mi J. L., Wang F. Q., Lin Q. Q., Liang R. S. and Liu S. H.,Chin. Phys. B 17, 1178 (2008).
[29] [29] MA X. F. and Lo H. K., New Journal of Physics 10, 073018(2008).
[30] [30] Gobby C., Yuan Z. L. and Shields A. J., Phys. Rev. Lett. 84,3762 (2004).
Get Citation
Copy Citation Text
ZHOU Yuan-yuan, JIANG Hua, WANG Ying-jian. Practical decoy-state quantum key distribution method considering dark count rate fluctuation[J]. Optoelectronics Letters, 2012, 8(5): 384
Received: Feb. 21, 2012
Accepted: --
Published Online: Jul. 12, 2017
The Author Email: Yuan-yuan ZHOU (zyy_hjgc@yahoo.com.cn)