• Journal of Infrared and Millimeter Waves
  • Vol. 35, Issue 2, 166 (2016)
ZHAO Nan1、2、*, ZHU Chang-Hua1, PEI Chang-Xing1, and ZHONG Shao-Chen2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.11972/j.issn.1001-9014.2016.02.008 Cite this Article
    ZHAO Nan, ZHU Chang-Hua, PEI Chang-Xing, ZHONG Shao-Chen. Novel and efficient near-infrared quantum anti-jamming detection scheme based on statistical theory against malicious attack[J]. Journal of Infrared and Millimeter Waves, 2016, 35(2): 166 Copy Citation Text show less
    References

    [1] Bennett C H,Brassard G.Quantum cryptography:Publish-keydistribution and coin tossing [C].In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 1984, Bangalore, India, 175-179.

    [2] GisinN, RibordyG, TittelW, et al. Quantum cryptography [J].Rev. Mod. Phys, 2002, 74:145-195.

    [3] NamikiR, HiranoT. Security of quantum cryptography using balanced homodyne detection [J]. Phys. Rev. A,2003, 67(2):2308.

    [4] LeverrierA, GrangierP.Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [J]. Phys. Rev,2009, 102:180504.

    [5] ScaraniV, B-PH, CerfN J, et al.The security of practical quantum key distribution [J]. Rev. Mod. Phys. 2009, 81(10):1301-1350.

    [6] ShorPW,PreskillJ. Simple proof of security of the BB84 quantum key distribution protocol[J].Phys. Rev. Lett.2000, 85(2):441-444.

    [7] Renner R, GisinN, KrausB.Distribution protocols [J]. Phys. Rev. A.2005,72(1):573.

    [8] PatelK A, DynesJ F, LucamariniM, et al.Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks [J]. Appl. Phys.Lett. 2014,104(5):051123-4.

    [9] Hayashi M.Hypothesis testing for an entangled state produced by spontaneous parametric down conversion[J].Phys. Rev. A.2006,74(6):154.

    [10] Inamori H, Lütkenhaus N, Mayers D.Unconditional security of practical quantum key distribution[J].Europe. Phys. J. D.2007,41(3):599-627.

    [11] Hayashi M.Prior entanglement between senders enables perfect quantum network coding with modification[J]. Phys. Rev. A.2007,76(4):538.

    [12] Scarani V, Renner R.Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing[J].Phys. Rev. Lett. 2008,100(20)1586-1594.

    [13] Huttner B, Imoto N, GisinN,et al.Quantum cryptography with coherent states[J].Phys. Rev. A.1995,51(3):1863-1869.

    [14] Dunjko V, Kashefi E, Leverrier A. Blind quantum computing with weak coherent pulses[J].Phys. Rev. Lett. 2012,-(20): 502.

    [15] Wang X-B. Beating the PNS attack in practical quantum cryptography [J].Phys. Rev. Lett. 2005,94(24):6102.

    [16] Acn A, Gisin N, Scarani V.Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks [J].Phys. Rev. A.2004,69(1):2309.

    [17] Qi B, Fung C-H F, Lo H-K.Time-shift attack in practical quantum cryptosystems[J].Quant. Inf. Comput. 2007,7(1):73-82.

    [18] Lin S, Wen Q Y, Gao F, et al.Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks[J].Phys. Rev. A.2009,79(5):1744-1747.

    [19] Ribordy G,Gisin N,Kraus B.Trojan-horse attacks on quantum-key-distribution systems[J].Phys.Rev. A.2006,73(24):457-460.

    [20] Lo H K, Ma X F , Chen K.Decoy state quantum key distribution: theory and practice[J].Phys. Rev. Lett.2004,94(23):504.

    [21] Yin Z Q, Fred Fung C H, Ma X F,et al.Mismatched-basis statistics enable quantum key distribution with uncharacterized qubitsources[J]. Phys. Rev. A.2014,90(5):319.

    [22] Pastukhov V M, Vladimirova Y V,Zadkov V N.Photon-number statistics from resonance fluorescence of a two-level atom near a plasmonic nanoparticle[J].Phys. Rev. A.2014,90(6):31.

    ZHAO Nan, ZHU Chang-Hua, PEI Chang-Xing, ZHONG Shao-Chen. Novel and efficient near-infrared quantum anti-jamming detection scheme based on statistical theory against malicious attack[J]. Journal of Infrared and Millimeter Waves, 2016, 35(2): 166
    Download Citation