Cargando…
Continuous-variable source-device-independent quantum key distribution against general attacks
The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the...
Autores principales: | Zhang, Yichen, Chen, Ziyang, Weedbrook, Christian, Yu, Song, Guo, Hong |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7174339/ https://www.ncbi.nlm.nih.gov/pubmed/32317691 http://dx.doi.org/10.1038/s41598-020-63024-5 |
Ejemplares similares
-
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
por: Gehring, Tobias, et al.
Publicado: (2015) -
Feasible attack on detector-device-independent quantum key distribution
por: Wei, Kejin, et al.
Publicado: (2017) -
Polarization Attack on Continuous-Variable Quantum Key Distribution with a Local Local Oscillator
por: Shao, Yun, et al.
Publicado: (2022) -
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions
por: Huang, Luyu, et al.
Publicado: (2019) -
Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution
por: Chen, Ziyang, et al.
Publicado: (2019)