[1]Bennett C H., Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. ICC IEEE, 1984, 560: 175-179.
[2]Gu Yabin, Bao Wansu, Wang Yang, et al.Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources[J].Chinese Physics Letters, 2016, 33(4):040301-
[3]Cheng Hua, An Xuebi, Wu Juan, et al.Hong-Ou-Mandel interference with two independent weak coherent states[J].Chinese Physics B, 2016, 25(2):020305-
[4]Li Yang, Liao Shengkai, Liang Futian, et al.Post-processing free quantum random number generator based on avalanche photodiode array[J].Chinese Physics Letters, 2016, 33(3):9-11
[5]Pirandola S, Mancini S, Lloyd S, et al.Continuous-variable quantum cryptography using two-way quantum communication[J].Nature Physics, 2006, 4(9):726-730
[6]Cerf N J, Lévy, M, Assche G V.Quantum distribution of Gaussian keys using squeezed states[J].Physical Review A, 2001, 63(5):052311-
[7]Frédéric Grosshans, Grangier P.Continuous Variable Quantum Cryptography Using Coherent States[J].Physical Review Letters, 2002, 88(5):057902-
[8]贾晓军, 段志园, 闫智辉.连续变量纠缠增强对实验参量的依赖关系[J].光学学报, 2013, 02:225-230
[9]胡康, 毛钱萍, 赵生妹.基于预报单光子源和探测器诱骗态的循环差分相移量子密钥分发协议[J].光学学报, 2017, 37(05):339-345
[10]林毅, 何广强, 曾贵华.LDPC码在量子密钥分配多维协商算法中的应用[J].量子光学学报, 2013, (02):40-45
[11]肖红,施鹏,赵生妹.基于 码的纠错延后量子协商协议[J].中国科学:科学技术, 2015, 45(8):843-848
[12]Bai Zengliang, Wang Xuyang, Yang Shenshen, et al.High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution[J].Science China(Physics, Mechanics & Astronomy), 2016, 59(1):1-5
[13]Wang X, Zhang Y C, Li Z, et al.Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution[J].Quantum Information & Computation, 2017, 17(13-14):1123-1134
[14]Leverrier A, Alleaume R, Boutros J.et alMultidimensional reconciliation for a continuous-variable quantum key distribution[J].Phys Rev A, 2008, 77(4):042325-
[15]Lu Zhao, Shi Jianhong, Li Fengguang.Spherical reconciliation for a continuous-variable quantum key distribution[J].China Physics B, 2017, 26(4):109-114
[16]Arikan E.Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels[J].Information Theory, IEEE Transactions on, 2009, 55(7):p-
[17]Afser H, Delic H.On the channel-specific construction of Polar codes[J].IEEE Communications Letters, 2015, 19(9):1480-1483
[18]Arikan E, Hassan N U, Lentmaier M, et al.Challenges and some new directions in channel coding[J].Journal of Communications & Networks, 2015, 17(4):328-338
[19]KoradaS.UrbankeR,SasogluE. Polar codes: characterization of exponent,bounds,and constructions[J].IEEE Transactions on Information Theory, 2010, 56(12):6253-6264
[20]Jouguet P, Kunz-Jacques S.High performance error correction for quantum key distribution using polar codes[J].Quantum Information & Computation, 2012, 14(3):-
[21]Nakassis A, Mink A.Polar codes in a QKD environment[C]. Quantum Information and Computation XII. Quantum Information and Computation XII, 2014:912305.
|