• Chinese Journal of Quantum Electronics
  • Vol. 36, Issue 4, 464 (2019)
ZHANGZiping 1、*, Guojun LIU1, Xu LU2, Xing HUANG3, and Yun LIU4
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • 4[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2019.04.013 Cite this Article
    ZHANGZiping, LIU Guojun, LU Xu, HUANG Xing, LIU Yun. Security performance analysis of quantum key distribution protocol based on depolarization channel[J]. Chinese Journal of Quantum Electronics, 2019, 36(4): 464 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing [C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. New York: IEEE , 1984: 175-179.

    [2] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science , 1999, 283: 2050-2056.

    [3] Shor P, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters , 2000, 85: 441-444.

    [4] Renner R. Security of quantum key distribution [J]. International Journal of Quantum Information , 2008, (1): 1-127.

    [5] Kraus B, Gisin N, Renner R. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication [J]. Physical Review Letters , 2005, 95: 080501.

    [6] Renner R, Gisin N, Kraus B. Information-theoretic security proof for quantum-key-distribution protocols [J]. Physical Review A , 2005, 72: 012332.

    [7] Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states [J]. Physical Review Letters , 2002, 88(5): 057902.

    [8] Inoue K, Waks E, Yamamoto Y. Differential phase shift quantum key distribution [J]. Physical Review Letters , 2002, 89(3): 037902.

    [9] Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance [J]. Nature , 2014, 509(7501): 475-478.

    [10] Ekert A K. Quantum cryptography based on Bell′s theorem [J]. Physical Review Letters , 1991, 67: 661-663.

    [11] Barrett J, Hardy L, Kent A. No signaling and quantum key distribution [J]. Physical Review Letters , 2005, 95: 010503.

    [12] Acin A, Brunner N, Gisin N, et al . Device-independent security of quantum cryptography against collective attacks [J]. Physical Review Letters , 2007, 98: 230501.

    [13] Arnon-Friedman R, Dupuis F, Fawzi O, et al . Practical device-independent quantum cryptography via entropy accumulation [J]. Nature Communications , 2018, 9(1): 459.

    [14] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution [J]. Physical Review Letters , 2012, 108(13): 130503.

    [15] Lucamarini M, Yuan Z L, Dynes J F, et al . Overcoming the rate distance limit of quantum key distribution without quantum repeaters [J]. Nature , 2018, 557(7705): 400-403.

    [16] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication [J]. Physical Review Letters , 2003, 91(5): 057901.

    [17] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters , 2005, 94(23): 230503.

    [18] Lo H K, Ma X, Chen K. Decoy state quantum key distribution [J]. Physical Review Letters , 2005, 94(23): 230504.

    ZHANGZiping, LIU Guojun, LU Xu, HUANG Xing, LIU Yun. Security performance analysis of quantum key distribution protocol based on depolarization channel[J]. Chinese Journal of Quantum Electronics, 2019, 36(4): 464
    Download Citation