• Chinese Journal of Quantum Electronics
  • Vol. 25, Issue 5, 572 (2008)
Ming-xing FU*
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    FU Ming-xing. Influence of path-attack on security of quantum key distribution networks[J]. Chinese Journal of Quantum Electronics, 2008, 25(5): 572 Copy Citation Text show less
    References

    [1] Townsend P D. Quantum cryptography on optical fiber networks [J].Optical Fiber Technology,1998,4: 345-370.

    [2] Elliott C. Building the quantum network [J].New J. Phys.,2002,4(46): 1-12.

    [3] Elliott C,Colvin A,Pearson D,et al. Current status of the DARPA quantum network [C].SPIE,2005,5815:138-149.

    [4] Dianati M,Alléume R. Architecture of the secoqc quantum key distribution network [C].Quantum,Nano,and Micro Technologies,2007.ICQNM'07.First International Conference on Jan. 2007,13.

    [8] Chen W,Han Z F,Zhang T,et al. Field experimental“Star Type”metropolitan quantum key distribution network [OL].arXiv:0708.3546v1[quant-ph].

    [9] Brassard G,Bussiéres F,Godbout N,et al. Multi-user quantum key distribution using wavelength division multiplexing [C].SPIE,2003,5260: 149-152.

    [10] Wang B C,Kumavor P,Yelin S F,et al. Multi-user quantum cryptography [C].SPIE,2005,6014: 1-12.

    [11] Kumavor P D,Beal A C,Donkor E,et al. Demonstration of a six-user quantum key distribution network on abus architecture [C].SPIE,2007,6573: 1-8.

    [12] Kumavor P D,Beal A C,Yelin S,et al. Comparison of four multi-user quantum key distribution schemes over passive optical networks [J].J. Ligh. Tecn.,2005,23(1): 268-272.

    [13] Fernandez V,Collins R J,Gordon K J,et al. Passive optical network approach to gigahertz-clocked multiuser quantum key distribution [J].IEEE J. Quan. Elec.,2007,43(2): 130-137.

    [14] Xiao T,Lijun M,Mink A,et al. Demonstration of an active quantum key distribution network [C].SPIE,2006,6305: 1-2.

    [15] Han Z F,Mo X F,Zhang T,et al. Quantum network addressing method and expandable quantum router [C].SPIE,2006,6244: 1-2.

    [16] Honjo T,Inoue K,Sahara A,et al. Quantum key distribution experiment through a PLC matrix switch [J].Optics Communications,2006,263: 120123.

    [17] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution [J].Phys. Rev. A,2000,61,052304.

    [18] Gottesman D,Lo H K,Lütkenhaus N,et al. Security of quantum key distribution with imperfect devices [J].Quantum Inf. Comput.,2004,4: 325.

    [19] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J].Phys. Rev. Lett.,2005,94: 230503.

    [20] Lo H K,Ma X F,Chen K. Decoy state quantum key distribution [J].Phys. Rev. Lett.,2005,94: 230504.

    [21] Zhao F,Fu M X,Lu Y Q,et al. Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution [J].Chin. Phys.,2007,16(11): 3402-3406.

    CLP Journals

    [1] Chen Yan, Yang Hongyu, Deng Ke. Effects of Photon-Number-Splitting Attacks on the Security of Satellite-to-Ground Quantum Key Distribution Systems[J]. Acta Optica Sinica, 2009, 29(11): 2989

    FU Ming-xing. Influence of path-attack on security of quantum key distribution networks[J]. Chinese Journal of Quantum Electronics, 2008, 25(5): 572
    Download Citation