Security analysis of an untrusted source for quantum key distribution: passive approach
From MaRDI portal
Publication:2980755
DOI10.1088/1367-2630/12/2/023024zbMath1447.81102arXiv0905.4225OpenAlexW3105798408WikidataQ62538038 ScholiaQ62538038MaRDI QIDQ2980755
Bing Qi, Hoi-Kwong Lo, Yi Zhao, Li Qian
Publication date: 3 May 2017
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0905.4225
Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (5)
Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source * ⋮ Plug-and-play sending-or-not-sending twin-field quantum key distribution ⋮ Finite-key security analysis of quantum key distribution with imperfect light sources ⋮ Quantum secret sharing without monitoring signal disturbance ⋮ Decoy-state quantum key distribution with a leaky source
Cites Work
This page was built for publication: Security analysis of an untrusted source for quantum key distribution: passive approach