Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Conference on Lasers and Electro-Optics/International Quantum Electronics Conference
  • OSA Technical Digest (CD) (Optica Publishing Group, 2009),
  • paper ITuI3
  • https://doi.org/10.1364/IQEC.2009.ITuI3

Quantum Key Distribution with an Untrusted Source

Not Accessible

Your library or personal account may give you access

Abstract

The “Plug & play” quantum cryptography scheme has significant advantage in real-life applications over other schemes and is adopted in most commercial quantum cryptosystems. Here, we present a rigorous security proof of it.

© 2009 Optical Society of America

PDF Article
More Like This
Solving the Untrusted Source Problem in Measurement-Device-Independent Quantum Key Distribution

Yucheng Qiao, Gan Wang, Zengyu Li, Bingjie Xu, Bin Luo, and Hong Guo
JTu2A.30 CLEO: Applications and Technology (CLEO:A&T) 2019

Scalable Measurement-Device-Independent Quantum Key Distribution Networks with Untrusted Relays

Hoi-Kwong Lo, Wenyuan Wang, and Feihu Xu
M1E.2 Optical Fiber Communication Conference (OFC) 2020

The Security of SARG04 Protocol with An Untrusted Source

Hong Guo, Xiang Peng, and Bingjie Xu
QMI19 International Conference on Quantum Information (QIM) 2011

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.