264 related articles for article (PubMed ID: 30320832)
1. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution.
Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ
Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832
[TBL] [Abstract][Full Text] [Related]
2. Suppression of patterning effect using IQ modulator for high-speed quantum key distribution systems.
Gao Y; Yuan Z
Opt Lett; 2023 Feb; 48(4):1068-1071. PubMed ID: 36791012
[TBL] [Abstract][Full Text] [Related]
3. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
[TBL] [Abstract][Full Text] [Related]
4. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
Liu L; Guo FZ; Wen QY
Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
[TBL] [Abstract][Full Text] [Related]
5. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
[TBL] [Abstract][Full Text] [Related]
6. All-fiber self-compensating polarization encoder for quantum key distribution.
Agnesi C; Avesani M; Stanco A; Villoresi P; Vallone G
Opt Lett; 2019 May; 44(10):2398-2401. PubMed ID: 31090697
[TBL] [Abstract][Full Text] [Related]
7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.
Song TT; Qin SJ; Wen QY; Wang YK; Jia HY
Sci Rep; 2015 Oct; 5():15276. PubMed ID: 26471947
[TBL] [Abstract][Full Text] [Related]
8. A 5 GHz and 7.5 V multi-amplitude modulator driving circuit for practical high-speed quantum key distribution.
Liu X; Huang MQ; Min H; Jin G; Jiang X; Peng CZ
Rev Sci Instrum; 2020 Feb; 91(2):024705. PubMed ID: 32113405
[TBL] [Abstract][Full Text] [Related]
9. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
[TBL] [Abstract][Full Text] [Related]
10. Entanglement-based secure quantum cryptography over 1,120 kilometres.
Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
[TBL] [Abstract][Full Text] [Related]
11. Measurement-device-independent quantum key distribution with leaky sources.
Wang W; Tamaki K; Curty M
Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254
[TBL] [Abstract][Full Text] [Related]
12. Experimental quantum key distribution with decoy states.
Zhao Y; Qi B; Ma X; Lo HK; Qian L
Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
[TBL] [Abstract][Full Text] [Related]
13. Application and Development of QKD-Based Quantum Secure Communication.
Lai J; Yao F; Wang J; Zhang M; Li F; Zhao W; Zhang H
Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190415
[TBL] [Abstract][Full Text] [Related]
14. Experimental quantum key distribution with uncharacterized sources and projective measurements.
Zhu JR; Wu WZ; Ji L; Zhang CM; Wang Q
Opt Lett; 2019 Dec; 44(23):5703-5706. PubMed ID: 31774758
[TBL] [Abstract][Full Text] [Related]
15. Hacking on decoy-state quantum key distribution system with partial phase randomization.
Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
[TBL] [Abstract][Full Text] [Related]
16. Experimental realization of a reference-frame-independent decoy BB84 quantum key distribution based on Sagnac interferometer.
Li YP; Chen W; Wang FX; Yin ZQ; Zhang L; Liu H; Wang S; He DY; Zhou Z; Guo GC; Han ZF
Opt Lett; 2019 Sep; 44(18):4523-4526. PubMed ID: 31517921
[TBL] [Abstract][Full Text] [Related]
17. Experimental underwater quantum key distribution.
Feng Z; Li S; Xu Z
Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
[TBL] [Abstract][Full Text] [Related]
18. An Efficient Routing Protocol for Quantum Key Distribution Networks.
Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N
Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133
[TBL] [Abstract][Full Text] [Related]
19. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.
Liu L; Guo FZ; Qin SJ; Wen QY
Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808
[TBL] [Abstract][Full Text] [Related]
20. Provably secure and high-rate quantum key distribution with time-bin qudits.
Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ
Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]