• Acta Photonica Sinica
  • Vol. 41, Issue 3, 339 (2012)
LI Chao1、*, NIE Min1, and LIU Xiao-hui1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3788/gzxb20124103.0339 Cite this Article
    LI Chao, NIE Min, LIU Xiao-hui. The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(3): 339 Copy Citation Text show less
    References

    [1] ZHAO Yi, QI Bing, MA Xiong-feng, et al. Experimental quantum key distribution with decoy states[J]. Physical Review Letters, 2006, 96(7): 070502-1-070502-4.

    [2] QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua, et al .New method of decoy state quantum key distribution with a heralded single-photon source[J]. Acta Physica Sinica, 2008, 57(9): 5600-5604.

    [3] CHEN Xia, WANG Fa-qiang, LU Yi-qun, et al. A differentialphase shift key distribution QKD system combing wit hefficient BB84 scheme[J]. Acta Photonica Sinca, 2008, 37(5): 1052-1056.

    [4] LIU D, PEI C X, QUAN D X, et al. A new quantum secure direct communication scheme with authentication[J]. Chinese Physics Letters, 2010, 27(5): 306

    [5] CHEN Zhi-xin, TANG Zhi-lie, LIAO Chang-jun, et al. Practical security problem of six states Q KD protocol[J].Acta Physica Sinica, 2006, 35(1): 126-129.

    [6] BRASSARD G, LTKENHAUS N, MOR T, et al. Limitations on pratical quantum cryptography[J]. Physical Review Letters, 2000, 85(6): 1330-1333.

    [7] MO X F, ZHU B, HAN Z F, et al. Faraday-Michelson system for quantum cryptography[J].Optics Letters, 2005, 30(19): 2632-2634.

    [8] YUAN Z L, SHIELDS A J. Continuous operation of a one-way quantum key distribution system over installed telecom fibre[J]. Optics Express, 2005, 13(2): 660-665.

    [9] HU J Z, WANG X B. Reexamination of the decoy-state quantum key distribution with an unstable source[J]. Physical Review A, 2010, 82(1): 012331.

    [10] WANG X B, PENG C Z, ZHANG J, et al. General theory of decoy-state quantum cryp tography with source errors[J]. Physical Review A, 2008, 77(4): 42311.

    [11] PENG C Z, ZHANG J, YANG D. Experimental long-distance decoy-state quantum key distribution based on polarization encoding[J]. Physical Review Letters, 2007, 98(1): 10505.

    [12] SCHM ITT-MANDERBACH T. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km[J]. Physical Review Letters, 2007, 98(1): 10504.

    [13] WANG X B, PENG C Z, PAN J W. Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source[J]. Applied Physics Letters, 2007, 90(3): 031110.

    LI Chao, NIE Min, LIU Xiao-hui. The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(3): 339
    Download Citation