Decoy-state quantum key distribution with a leaky source

Tamaki K., Curty M., Lucamarini M., Gramegna Marco
Keywords:

quantum key distribution, device-independent quantum key distribution, quantum communication, security analysis, information leakage, Trojan horse attacks

Document type Article
Journal title / Source New Journal of Physics
Peer-reviewed article 1
Volume 18
Issue June 2016
Page numbers / Article number 065008
Publisher's name IOP Publishing
Publisher's address (city only) Bristol (UK)
Publication date 2016-6-20
ISSN 1367-2630
DOI 10.1088/1367-2630/18/6/065008
Web URL http://iopscience.iop.org/journal/1367-2630
Language English

Back to the list view