1 |
N.Gisin,G. Ribordy,W. Tittel, andH. Zbinden, "Quantum cryptography,"Rev. Mod. Phys., vol. 74, pp. 145-95, 2002.
DOI
ScienceOn
|
2 |
K. Inoue, E. Waks, and Y. Yamamoto, "Differential-phase-shift quantum key distribution,"Phys. Rev. Lett., vol. 89, no. 3, pp. 037902-1-37902-3, Jul. 2002.
DOI
ScienceOn
|
3 |
K. Inoue, E. Waks, and Y. Yamamoto, "Differential-phase-shift quantum key distribution using coherent light,"Phys. Rev. A, vol. 68, pp. 022317-1-022317-3, Aug. 2003.
DOI
|
4 |
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification,"IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
DOI
ScienceOn
|
5 |
E. Waks, H. Takesue, and Y. Yamamoto, "Security of differential-phaseshift quantum key distribution against individual attacks,"Phys. Rev. A, vol. 73, no. 7, pp. 012344-1-12344-9, Jan. 2006.
DOI
|
6 |
M. Curty, L. L. Zhang, H. -H. Lo, and N. Lutkenhaus, "Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states,"Quant. Inf. Comput., vol. 7, no. 7, pp. 665-88,
|
7 |
F. Gao, B. Liu, Q.-YWen, and H. Chen, "Flexible quantum private queries based on quantum key distribution,"Opt. Exp., vol. 20, pp. 17411-7420, 2012.
DOI
|
8 |
J. Zhang, F.-Z Guo, F. Gao, B. Liu, and Q.-Y Wen, "Private database queries based on counterfactual quantum key distribution,"Phys. Rev. A, vol. 88, p. 022334, 2013.
DOI
|
9 |
M. V. P. Rao and M. Jakobi, "Towards communication-efficient quantum oblivious key distribution," Phys. Rev. A, vol. 87, p. 012331, 2013.
DOI
|