• Chinese Journal of Quantum Electronics
  • Vol. 33, Issue 1, 44 (2016)
Zhiyong ZHANG*, Yanbo WANG, Min HE, and Jian WANG
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2016.01.006 Cite this Article
    ZHANG Zhiyong, WANG Yanbo, HE Min, WANG Jian. Intercept-resent eavesdropping in polarization-drift quantum cryptography[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 44 Copy Citation Text show less
    References

    [1] Li Hongwei, Yin Zhengqiang, Han Zhengfu, et al. Security of practical phase-coding quantum key distribution[J]. Quantum Information and Computation, 2010, 10(9/10): 0771-0779.

    [2] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing Bangalore India (IEEE), 1984, 175-179.

    [3] Yuen H P. On the foundations of quantum key distribution-reply to renner and beyond[J]. Quantum ICT Research Institute Bulletin of Tamagawa University, 2013, 3(1): 1.

    [4] Elboukhari M, Azizi M, Azizi A. Analysis of the security of BB84 by model checking[J]. International Journal of Network Security and Its Applications, 2010, 2(2): 87-98.

    [5] Hasegawa J, Hayashi M, Hiroshima T, et al. Experimental decoy state quantum key distribution with uncoditional security incorporating finite statistics[C]. Quantum Electronics and Laser Science Conference, 2007.

    [6] Yuen H P. Some physics and system issues in the security analysis of quantum key distribution protocols[J]. Quantum Information Processing, 2014, 13(10): 2241-2254.

    [7] Lavale M. Analysis of differential phase shift quantum key distribution[J]. 2011, arXiv preprint arXiv: 1110.4820.

    [8] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 312.

    ZHANG Zhiyong, WANG Yanbo, HE Min, WANG Jian. Intercept-resent eavesdropping in polarization-drift quantum cryptography[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 44
    Download Citation