• Acta Optica Sinica
  • Vol. 36, Issue 3, 327003 (2016)
Yan Jin*, Wang Xiaokai, Guo Dabo, and Sun Yi
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos201636.0327003 Cite this Article Set citation alerts
    Yan Jin, Wang Xiaokai, Guo Dabo, Sun Yi. Security Analysis of Post-Processing in Quantum Gaussian Key Distributed[J]. Acta Optica Sinica, 2016, 36(3): 327003 Copy Citation Text show less
    References

    [1] Hoi Kwong Lo, Hoi Fung Chau. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 1998, 283 (5410): 2050-2056.

    [2] Huang Chunhui, Wang Xuejin. Research and prospect on continuous variable quantum communication[J]. Journal of Electronic Measurement and Instrument, 2014, 28(1): 1-9.

    [3] Liu Youming, Wang Chao, Huang Duan, et al.. Study of synchronous technology in high-speed continuous variable quantum key distribution system[J]. Acta Optica Sinica, 2015, 35(1): 0106006.

    [4] Wenchao Dai, Yuan Lu, Jun Zhu, et al.. An integrated quantum secure communication system[J]. Science China, 2011, 54(12): 2578- 2591.

    [5] Xuyang Wang, Zengliang Bai, Shaofeng Wang, et al.. Four-state modulation continuous variable quantum key distribution over a 30- km fiber and analysis of excess noise[J]. Chinese Physics Letters, 2013, 30(1): 010305.

    [6] Anthony Leverrier, Philippe Grangier. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation[J]. Physical Review A, 2011, 83(4): 042312.

    [7] Paul Jouguet, Sébastien Kunz-Jacques, Anthony Leverrier, et al.. Experimental demonstration of long-distance continuous-variable quantum key distribution[J]. Nature Photonics, 2013, 7 (5): 378-381.

    [8] Fabian Furrer, Torsten Franz, Mario Berta, et al.. Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks[J]. Physical Review Letters, 2012, 109(10): 100502.

    [9] Gilles Van Assche, Jean Cardinal, Nicolas J Cerf. Reconciliation of a quantum-distributed Gaussian key[J]. IEEE Transactions on Information Theory, 2004, 50(2): 394-400.

    [10] Angelos D Liveris, Zixiang Xiong, Costas N Georghiades. Compression of binary sources with side information at the decoder using LDPC codes[J]. Communications Letters IEEE, 2002, 6 (10): 440-442.

    [11] Ahmed Attia Abotabl, Aria Nosratinia. Multi-level coding and multi-stage decoding in MAC, broadcast, and relay channel[C]. IEEE International Symposium on Information Theory, 2014, 2014: 96-100.

    [12] Guo Dabo, Liu Gang, Zhang Ning, et al.. Reverse reconciliation of quantum Gaussian distributed key[J]. Acta Sinica Quantum Optica, 2013, 19(3): 219-226.

    [13] Juane Li, Keke Liu, Shu Lin, et al.. Algebraic quasi-cyclic LDPC codes: construction, low error-floor, large girth and a reduced-complexity decoding scheme[J]. IEEE Transactions on Communications, 2014, 62(8): 2626-2637.

    [14] Dabo Guo, Yanhuang Zhang, Yunyan Wang. Performance optimization for the reconciliation of Gaussian quantum key distribution[J]. Acta Optica Sinica, 2014, 34(1): 0127001.

    [15] Lu Zhixin, Yu Li, Li Kang, et al.. Reconciliation for continuous variable quantum key distribution based on reverse reconciliation[J]. Science China Physics, Mechanics and Astronomy, 2009, 39(11): 1606-1612.

    [16] Song Hanchong, Gong Lihua, Zhou Nanrun. Continuous-variable quantum deterministic key distribution protocol based on quantum teleportation[J]. Acta Physics Sinica, 2012, 61(15): 154206.

    [17] Xinlu Zhi, Yu Li, Kang Li, et al.. Reverse reconciliation for continuous variable quantum key distribution[J]. Science China Physics, Mechanics and Astronomy, 2010, 53(1): 100-105.

    [18] Chen Yan, Shen Yong, Zou Hongxin. An all-fiber continuous variable quantum key distribution based on multi-bits coding of single pulse[J]. Acta Optica Sinica, 2015, 35(7): 0727001.

    [19] Xiangchun Ma, Shihai Sun, Musheng Jiang, et al.. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution[J]. Physical Review A, 2013, 89(4): 042335.

    [20] David J C MacKay. Good error-correcting codes based on very sparse matrices[J]. IEEE Transactions on Information Theory, 1999, 45 (2): 399-431.

    [21] Yingyu Tai, Lan Lan, Lingqi Zeng, et al.. Algebraic construction of quasi-cyclic LDPC codes for the AWGN and erasure channels[J]. IEEE Transactions on Communications, 2006, 54(10): 1765-1774.

    [22] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al.. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution[J]. Acta Optica Sinica, 2014, 34(8): 0827002.

    CLP Journals

    [1] Jiang Yinghua, Zhang Shibin, Yang Fan, Chang Yan, Zhang Hang. (4,4) Quantum Secret Sharing Protocol and Its Modeling Checking[J]. Laser & Optoelectronics Progress, 2017, 54(12): 122704

    Yan Jin, Wang Xiaokai, Guo Dabo, Sun Yi. Security Analysis of Post-Processing in Quantum Gaussian Key Distributed[J]. Acta Optica Sinica, 2016, 36(3): 327003
    Download Citation