Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3522608

zbMath1152.81801arXivquant-ph/0512080MaRDI QIDQ3522608

No author found.

Publication date: 3 September 2008

Full work available at URL: https://arxiv.org/abs/quant-ph/0512080

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (34)

An enhanced proposal on decoy-state measurement device-independent quantum key distributionThe enhanced measurement-device-independent quantum key distribution with two-intensity decoy statesMUB tomography performance under influence of systematic errorsCan the use of the Leggett-Garg inequality enhance security of the BB84 protocol?Measurement-device-independent quantum key distribution with uncharacterized coherent sourcesPredicting optimal parameters with random forest for quantum key distributionQuantum Key Distribution Protocol OptimizationA new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent lightTwo-way deterministic quantum key distribution against passive detector side channel attacks in the forward lineThe feasible hyper-encoding measurement-device-independent deterministic secure quantum communication protocolQuantum key distribution system against the probabilistic faint after-gate attackHigh-capacity measurement-device-independent quantum secure direct communicationPractical source-independent quantum random number generation with detector efficiency mismatchDifferential phase encoded measurement-device-independent quantum key distributionDetector blinding attacks on counterfactual quantum key distributionThe general theory of three-party quantum secret sharing protocols over phase-damping channelsOptimal LSBs-based quantum watermarking with lower distortionPractical aspects of measurement-device-independent quantum key distributionMemory-assisted measurement-device-independent quantum key distributionLoss-tolerant measurement-device-independent quantum random number generationQuantum private comparison over noisy channelsA high dimensional measurement-device-independent quantum key distribution scheme based on optical quantum state fusion and fissionAttack Strategies on QKD ProtocolsSecurity of BB84 with weak randomness and imperfect qubit encodingNew scheme for measurement-device-independent quantum key distributionImproved statistical fluctuation analysis for measurement-device-independent quantum key distributionMonitoring the intercept-resend attack with the weak measurement modelQuantum key distribution with quantum walksMulti-party measurement-device-independent quantum key distribution based on cluster statesA quantum optical firewall based on simple quantum devicesKey distribution. Episode 1: Quantum menaceImproving the Performance of Practical Decoy-State Measurement-Device-Independent Quantum Key Distribution with Biased Basis ChoiceDecoy-state quantum key distribution with a leaky sourceHigh-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform







This page was built for publication: