Chinese Journal of Quantum Electronics, Volume. 26, Issue 6, 675(2009)
Extension of point-to-multi-point quantum key distribution systems
[1] [1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. Processing of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, New York: IEEE, 1984, 175-179.
[2] [2] Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber [J]. Applied Physics Letters, 2004, 84(19): 3762-3763.
[3] [3] Mo X F, Zhu B, Han Z F, et al. Faraday-Michelson system for quantum cryptography [J]. Optics Letters, 2005, 30(19): 2632-2634.
[4] [4] Takesue H, Diamanti E, Honjo T, et al. Differential phase shift quantum key distribution experiment over 105 km fiber [J]. New Journal of Physics, 2005, 7(1): 232-243.
[5] [5] Rosenberg D, Harrington J W, Rice P R, et al. Long-distance decoy-state quantum key distribution in optical fiber [J]. Phys. Rev. Lett., 2007, 98(1): 010503.
[8] [8] Townsend P D. Quantum cryptography on optical fiber networks [J]. Optical Fiber Technology, 1998, 4: 345-370.
[9] [9] Elliott C. Building the quantum network [J]. New Journal of Physics, 2002, 4(1): 346.
[11] [11] Chen W, Han Z F, Zhang T, et al. Field experimental “star type” metropolitan quantum key distribution network [OL]. arXiv: 0708.3546v1 [quant-ph], http://arxiv.org/abs/0708.3546.
[12] [12] Fernandez V, Collins R J, Gordon K J, et al. Passive optical network approach to gigahertz-clocked multiuser quantum key distribution [J]. IEEE Journal of Quantum Electronics, 2007, 43(2): 130-137.
[13] [13] Honjo T, Inoue K, Sahara A, et al. Quantum key distribution experiment through a PLC matrix switch [J]. Optics Communications, 2006, 263: 120-123.
[14] [14] Toliver P, Runser R J, Chapuran T E, et al. Experimental investigation of quantum key distribution through transparent optical switch elements [J]. IEEE Photonics Technology Letters, 2003, 15(11): 1669-1671.
[15] [15] Zhao B, Chen Z B, Chen Y A, et al. Robust creation of entanglement between remote memory qubits [J]. Physics Review Letters, 2007, 98(240502): 1-3.
[16] [16] Valiev K A. Quantum computers and quantum computations [J]. Physics-Uspekhi, 2005, 48(1): 1-36.
[17] [17] Gordon K J, Fernandez V, Townsend P D, et al. A short wavelength gigahertz clocked fiber-optic quantum key distribution system [J]. IEEE Journal of Quantum Electronics, 2004, 40(7): 900-908.
[18] [18] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution [J]. Physics Review A, 2000, 61(5): 052304.
[19] [19] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution [J]. Physics Review Letters, 2005, 94(23): 230504.
[21] [21] Waks E, Takesue H, Yamamoto Y. Security of differential-phase-shift quantum key distribution against individual attacks [J]. Physics Review A, 2006, 73(1): 012344.
[22] [22] Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution [J]. Physics Review A, 2005, 72(1): 012326.
Get Citation
Copy Citation Text
ZHAO Feng, WANG Shao-hua, CHEN Li, LONG Guang-li. Extension of point-to-multi-point quantum key distribution systems[J]. Chinese Journal of Quantum Electronics, 2009, 26(6): 675
Category:
Received: Nov. 5, 2008
Accepted: --
Published Online: May. 24, 2010
The Author Email:
CSTR:32186.14.