[1]Arute F, Arya K, Babbush R, et al.Quantum supremacy using a programmable superconducting processor[J].Nature, 2019, 574(7779):505-510
[2] Zhong Hansen, Wang Hui, Deng Yuhao, et al.Quantum computational advantage using photons[J].Science, 2020, 370(6523):-
[3]Yin Hualei, Chen Tengyun, Yu Zongwen, et al.Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber[J].Physical Review Letters, 2016, 117(19):190501-
[4]Liao Shengkai, Cai Wenqi, Handsteiner Johannes, et al.Satellite-Relayed Intercontinental Quantum Network[J].Physical Review Letters, 2018, 120(3):030501-
[5]吴长锋.量子保密通信" 京沪干线" 具备开通条件[J].中国战略新兴产业, 2017, (037):-
[6]Xu Feihu, Ma Xiongfeng, et al.Secure quantum key distribution with realistic devices[J].Reviews of Modern Physics, 2020, 92(3):25002-
[7]马媛媛, 贾耕涛 等.量子密钥分配系统波长攻击安全性分析[J].量子电子学报, 2019, 36(3):342-347
[8]Lo H.K.,Ma X,Chen KDecoy state quantum key distribution[J].Physical Review Letters, 2005, 94(23):230504-
[9]周飞,王向斌.实用化量子通信技术[J].信息安全研究, 2017, 3(1):80-85
[10]Weier H, Krauss H, Ran M, et al.Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors[J].New Journal of Physics, 2011, 13(7):073024-
[11]刘慧.量子密钥分发系统中若干非对称问题的实验研究[D].合肥: 中国科学技术大学,2020: 26-27.
[12]谢虹波.自由空间高速实时量子密钥分发系统关键技术研究[D].合肥: 中国科学技术大学,2019: 83-87.
|