Chinese Journal of Quantum Electronics, Volume. 35, Issue 6, 674(2018)
Quantum key distribution system based on time-division multiplexing technique
[1] [1] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters, 2000, 85(2): 441-444.
[3] [3] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984: 175-179.
[6] [6] Zhao Yibo, Fung C H F, Han Zhengfu, et al. Security proof of differential phase shift quantum key distribution in the noiseless case [J]. Physical Review A, 2008, 78(4): 042330.
[7] [7] Koashi M. Simple security proof of quantum key distribution based on complementarity [J]. New Journal of Physics, 2009, 11(4): 045018.
[8] [8] Wen K, Tamaki K, Yamamoto Y. Unconditional security of single-photon differential phase shift quantum key distribution [J]. Physical Review Letters, 2009, 103(17): 170503.
[9] [9] Inamori H, Lütkenhaus N, Mayers D. Unconditional security of practical quantum key distribution [J]. The European Physical Journal D-Atomic, Molecular, Optical and Plasma Physics, 2007, 41(3): 599-627.
[10] [10] Hayashi M, Tsurumaru T. Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths [J]. New Journal of Physics, 2012, 14(9): 093014.
[11] [11] Hayashi M, Nakayama R. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths [J]. New Journal of Physics, 2014, 1(6): 063009.
[12] [12] Qi B, Fung C H F, Lo H K, et al. Time-shift attack in practical quantum cryptosystems [J]. Quantum Information and Computation, 2007, 7(1): 73-82.
[13] [13] Makarov V, Brylevski A, Hjelme D R. Real-time phase tracking in single-photon interferometers [J]. Applied Optics, 2004, 43(22): 4385-4392.
[15] [15] Curty M, Lütkenhaus N. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses [J]. Physical Review A, 2005, 71(6): 062301.
[16] [16] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quantum Information and Computation, 2004, 4(5): 325-360.
Get Citation
Copy Citation Text
YAN Rui, HONG Zhanyong, LIU Jianhong, YU Gang. Quantum key distribution system based on time-division multiplexing technique[J]. Chinese Journal of Quantum Electronics, 2018, 35(6): 674
Category:
Received: Sep. 7, 2017
Accepted: --
Published Online: Dec. 26, 2018
The Author Email: Rui YAN (yanr2018@163.com)