scientific article
From MaRDI portal
Publication:3522608
zbMath1152.81801arXivquant-ph/0512080MaRDI QIDQ3522608
No author found.
Publication date: 3 September 2008
Full work available at URL: https://arxiv.org/abs/quant-ph/0512080
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (34)
An enhanced proposal on decoy-state measurement device-independent quantum key distribution ⋮ The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states ⋮ MUB tomography performance under influence of systematic errors ⋮ Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol? ⋮ Measurement-device-independent quantum key distribution with uncharacterized coherent sources ⋮ Predicting optimal parameters with random forest for quantum key distribution ⋮ Quantum Key Distribution Protocol Optimization ⋮ A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light ⋮ Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line ⋮ The feasible hyper-encoding measurement-device-independent deterministic secure quantum communication protocol ⋮ Quantum key distribution system against the probabilistic faint after-gate attack ⋮ High-capacity measurement-device-independent quantum secure direct communication ⋮ Practical source-independent quantum random number generation with detector efficiency mismatch ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ Detector blinding attacks on counterfactual quantum key distribution ⋮ The general theory of three-party quantum secret sharing protocols over phase-damping channels ⋮ Optimal LSBs-based quantum watermarking with lower distortion ⋮ Practical aspects of measurement-device-independent quantum key distribution ⋮ Memory-assisted measurement-device-independent quantum key distribution ⋮ Loss-tolerant measurement-device-independent quantum random number generation ⋮ Quantum private comparison over noisy channels ⋮ A high dimensional measurement-device-independent quantum key distribution scheme based on optical quantum state fusion and fission ⋮ Attack Strategies on QKD Protocols ⋮ Security of BB84 with weak randomness and imperfect qubit encoding ⋮ New scheme for measurement-device-independent quantum key distribution ⋮ Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution ⋮ Monitoring the intercept-resend attack with the weak measurement model ⋮ Quantum key distribution with quantum walks ⋮ Multi-party measurement-device-independent quantum key distribution based on cluster states ⋮ A quantum optical firewall based on simple quantum devices ⋮ Key distribution. Episode 1: Quantum menace ⋮ Improving the Performance of Practical Decoy-State Measurement-Device-Independent Quantum Key Distribution with Biased Basis Choice ⋮ Decoy-state quantum key distribution with a leaky source ⋮ High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
This page was built for publication: