• Chinese Journal of Quantum Electronics
  • Vol. 33, Issue 1, 51 (2016)
Shi CHEN*, Hongjun LV, and Guangjun XIE
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2016.01.007 Cite this Article
    CHEN Shi, LV Hongjun, XIE Guangjun. Design and simulation of quantum circuits of B92 QKD protocol[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 51 Copy Citation Text show less
    References

    [1] Wiesner S. Conjugate coding[J]. ACM Sigact News, 1983, 15(1): 78-88.

    [2] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984.

    [3] Ekert A K. Quantum cryptography based on Bell theorem[J]. Phys. Rev. Lett., 1991, 67(6): 661-663.

    [4] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing[J]. Phys. Rev. A, 1999, 59: 1829-1834.

    [5] Sen A, Sen U, Wiesniak M. Multiqubit W states lead to stronger nonclassicality than GHZ states[J]. Phys. Rev. A, 2003, 68: 062306.

    [7] Nanrum Z, Li J W, Li H G, et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping[J]. Opt. Comm., 2011, 284: 4836-4842.

    [8] Symul T, et al. Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise[J]. Phys. Rev. A, 2007, 76: 030303(R).

    [9] Shen Y. Experimental study on discretely modulated continuous-variable quantum key distribution[J]. Phys. Rev. A, 2010, 82: 022317.

    [10] Leverrier A, Grangier P. Unconditional security proof of long-distance continuous-variable quantum key distribution with a discrete modulation[J]. Phys. Rev. Lett., 2009, 102: 180504.

    [11] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.

    [12] Tamaki K, Lütkenhaus N. Unconditional security of the Bennett 1992 quantum key-distribution over lossy and noisy channel[J]. arXiv preprint quant-ph/0308048, 2003.

    [13] Aggarwal R, Sharma H, Gupta D. Analysis of various attacks over BB84 quantum key distribution protocol[J]. International Journal of Computer Applications, 2011, 20(8):28-31.

    [14] Dehmani M, Ez-Zahraouy H, Benyoussef A. Quantum cryptography with several cloning attacks[J]. Journal of Computer Science, 2010, (7): 684-688.

    [15] Pereszlenyi A. Simulation of quantum key distribution with noisy channels[C]. Proceedings of the 8th International Conference on Telecommunications, 2005: 203-210.

    [16] Eastin B, Flammia S T. Q-circuit tutorial[OL]. arXiv preprint quant-ph/0406003, 2004.

    CHEN Shi, LV Hongjun, XIE Guangjun. Design and simulation of quantum circuits of B92 QKD protocol[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 51
    Download Citation