• Chinese Journal of Quantum Electronics
  • Vol. 35, Issue 6, 674 (2018)
Rui YAN1、*, Zhanyong HONG1, Jianhong LIU2, and Gang YU2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2018.06.006 Cite this Article
    YAN Rui, HONG Zhanyong, LIU Jianhong, YU Gang. Quantum key distribution system based on time-division multiplexing technique[J]. Chinese Journal of Quantum Electronics, 2018, 35(6): 674 Copy Citation Text show less
    References

    [1] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters, 2000, 85(2): 441-444.

    [3] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984: 175-179.

    [6] Zhao Yibo, Fung C H F, Han Zhengfu, et al. Security proof of differential phase shift quantum key distribution in the noiseless case [J]. Physical Review A, 2008, 78(4): 042330.

    [7] Koashi M. Simple security proof of quantum key distribution based on complementarity [J]. New Journal of Physics, 2009, 11(4): 045018.

    [8] Wen K, Tamaki K, Yamamoto Y. Unconditional security of single-photon differential phase shift quantum key distribution [J]. Physical Review Letters, 2009, 103(17): 170503.

    [9] Inamori H, Lütkenhaus N, Mayers D. Unconditional security of practical quantum key distribution [J]. The European Physical Journal D-Atomic, Molecular, Optical and Plasma Physics, 2007, 41(3): 599-627.

    [10] Hayashi M, Tsurumaru T. Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths [J]. New Journal of Physics, 2012, 14(9): 093014.

    [11] Hayashi M, Nakayama R. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths [J]. New Journal of Physics, 2014, 1(6): 063009.

    [12] Qi B, Fung C H F, Lo H K, et al. Time-shift attack in practical quantum cryptosystems [J]. Quantum Information and Computation, 2007, 7(1): 73-82.

    [13] Makarov V, Brylevski A, Hjelme D R. Real-time phase tracking in single-photon interferometers [J]. Applied Optics, 2004, 43(22): 4385-4392.

    [15] Curty M, Lütkenhaus N. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses [J]. Physical Review A, 2005, 71(6): 062301.

    [16] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quantum Information and Computation, 2004, 4(5): 325-360.

    YAN Rui, HONG Zhanyong, LIU Jianhong, YU Gang. Quantum key distribution system based on time-division multiplexing technique[J]. Chinese Journal of Quantum Electronics, 2018, 35(6): 674
    Download Citation