Chinese Journal of Quantum Electronics, Volume. 40, Issue 3, 407(2023)
Research on the upper bound of collective attack in E91-QKD
[1] Ekert A K. Quantum cryptography based on Bell's theorem[J]. Physical Review Letters, 67, 661-663(1991).
[2] Scarani V, Bechmann-Pasquinucci H, Cerf N J et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 81, 1301-1350(2009).
[3] Xu F H, Ma X F, Zhang Q et al. Secure quantum key distribution with realistic devices[J]. Reviews of Modern Physics, 92, 025002(2020).
[4] Ye W, Zhong H, Liao Q et al. Improvement of self-referenced continuous-variable quantum key distribution with quantum photon catalysis[J]. Optics Express, 27, 17186-17198(2019).
[5] Hu L Y, Al-amri M, Liao Z Y et al. Continuous-variable quantum key distribution with non-Gaussian operations[J]. Physical Review A, 102, 012608(2020).
[6] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 283, 2050-2056(1999).
[7] Fröhlich B, Lucamarini M, Dynes J F et al. Long-distance quantum key distribution secure against coherent attacks[J]. Optica, 4, 163-167(2017).
[8] Biham E, Mor T. Security of quantum cryptography against collective attacks[J]. Physical Review Letters, 78, 2256-2259(1997).
[9] Acín A, Brunner N, Gisin N et al. Device-independent security of quantum cryptography against collective attacks[J]. Physical Review Letters, 98, 230501(2007).
[10] Biham M, Boyer G, Brassard J et al. Security of quantum key distribution against all collective attacks[J]. Algorithmica, 34, 372-388(2002).
[11] Pironio S, Acín A, Brunner N et al. Device-independent quantum key distribution secure against collective attacks[J]. New Journal of Physics, 11, 045021(2009).
[12] Li W, Wang L, Zhao S M. Phase matching quantum key distribution based on single-photon entanglement[J]. Scientific Reports, 9, 15466(2019).
[13] Yin Z Q, Fung C H F, Ma X F et al. Measurement-device-independent quantum key distribution with uncharacterized qubit sources[J]. Physical Review A, 88, 062322(2013).
[14] Fuchs C A, Gisin N, Griffiths R B et al. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy[J]. Physical Review A, 56, 1163-1172(1997).
[15] Bennett C H, DiVincenzo D P, Smolin J A et al. Mixed-state entanglement and quantum error correction[J]. Physical Review A, 54, 3824-3851(1996).
[16] Bruß D. Optimal eavesdropping in quantum cryptography with six states[J]. Physical Review Letters, 81, 3018-3021(1998).
[17] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 85, 441-444(2000).
[18] Deutsch D, Ekert A, Jozsa R et al. Quantum privacy amplification and the security of quantum cryptography over noisy channels[J]. Physical Review Letters, 77, 2818-2821(1996).
[19] Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 6, 1-127(2008).
[20] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography[J]. Physical Review Letters, 94, 230503(2005).
[21] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 94, 230504(2005).
[22] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Physical Review Letters, 108, 130503(2012).
Get Citation
Copy Citation Text
Wei JIA, Qiangqiang ZHANG, Yuxiang BIAN, Wei LI. Research on the upper bound of collective attack in E91-QKD[J]. Chinese Journal of Quantum Electronics, 2023, 40(3): 407
Category:
Received: Aug. 23, 2021
Accepted: --
Published Online: Jun. 30, 2023
The Author Email: LI Wei (alfred_wl@njupt.edu.cn)