• Acta Optica Sinica
  • Vol. 35, Issue 2, 227001 (2015)
Han Baoyuan1、* and Kong Xiangjin2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.31788/aos201535.0227001 Cite this Article Set citation alerts
    Han Baoyuan, Kong Xiangjin. Optimal Solution of Phase-Remapping Attack[J]. Acta Optica Sinica, 2015, 35(2): 227001 Copy Citation Text show less
    References

    [1] Shen Zeyuan, Fang Jian, He Guangqiang, et al.. Synchronous scheme and experimental realization in continuous variable quautum key distribution system [J]. Chinese J Lasers, 2013, 40(3): 0305004.

    [2] Haibin Du, Yan Liang, Shengxiang Zhang, et al.. Practical high-speed light source for decoy-state quantum key distribution [J]. Chin Opt Lett, 2014, 12(7): 072702.

    [3] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al.. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution [J]. Acta Optica Sinica, 2014, 34(8): 0827002.

    [4] Michel Boyer, Ran Gelles, Tal Mor. Attacks on fixed-apparatus quantum-key-distribution schemes [J]. Phys Rev A, 2014, 90(1): 012329.

    [5] W T Buttler, R J Hughes, S K Lamoreaux, et al.. Daylight quantum key distribution over 1.6 km [J]. Phys Rev Lett, 2000, 84(24): 5652-5655.

    [6] C Kuresiefer, P Zarda, M Halder, et al.. A step towards global key distribution [J]. Nature, 2002, 419: 450.

    [7] Huang Jianhua, Wu Guang, Zeng Heping. Study of 1.5 GHz harmonics ultrashort pulse gated InGaAs/InP avalanche photodiode single-photon detection [J]. Acta Optica Sinica, 2014, 34(2): 0204001.

    [8] Guo Xueshi, Gao Kang, Liu Nannan, et al.. Differential detection system for measuring the quantum noise of pulsed light [J]. Acta Optica Sinica, 2013, 33(9): 0927002.

    [9] Feng Tang, Bing Zhu. Scintillation discriminator improves free-space quantum key distribution [J]. Chin Opt Lett, 2013, 11(9): 090101.

    [10] A Rubenok, J A Slater, P Chan, et al.. Real- world two- photon interference and proof- of- principle quantum key distribution immune to detector attacks [J]. Phys Rev Lett, 2013, 111(13): 130501.

    [11] Normand J Beaudry, Marco Lucamarini, Stefano Mancini, et al.. Security of two-way quantum key distribution [J]. Phys Rev A, 2013, 88(6): 062302.

    [12] Miloslav Dusek, Ondrej Haderka, Martin Hendrych, et al.. Quantum identification system [J]. Phys Rev A, 1999, 60(1): 149-156.

    [13] Gilles Brassard, Norbert Lütkenhaus, Tal Mor, et al.. Limitations on practical quantum cryptography [J]. Phys Rev Lett, 2000, 85(6): 1330-1333.

    [14] Vadim Makarov, Andrey Anisimov, Johannes Skaar. Effects of detector efficiency mismatch on security of quantum cryptosystems [J]. Phys Rev A , 2006, 74(2): 022313.

    [15] Vadim Makarov. Controlling passively quenched single photon detectors by bright light [J]. New J Phys, 2009, 11(6): 065003.

    [16] L Lydersen, C Wiechers, C Wittmann, et al.. Hacking commercial quantum cryptography systems by tailored bright illumination [J]. Nat Photonics , 2010, 4(10): 686-689.

    [17] Francesco Buscemi, Michael J W Hall, Masanao Ozawa, et al.. Noise and disturbance in quantum measurements: An informationtheoretic approach [J]. Phys Rev Lett, 2014, 112(5): 050401.

    [18] Fabio Grazioso, Frederic Grosshans. Quantum- key- distribution protocols without sifting that are resistant to photon- numbersplitting attacks [J]. Phys Rev A, 2013, 88(5): 052302.

    [19] A Muller, T Herzog, B Huttner, et al..“Plug and play”systems for quantum cryptography [J]. Appl Phys Lett, 1997, 70(7): 793-795.

    [20] Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, et al.. Phase-remapping attack in practical quantum-key-distribution systems [J]. Phys Rev A, 2007, 75(3): 032314.