References
- M. Peev, C. Pacher, R. All'eaume, C. Barreiro, J. Bouda, W. Boxleitner,T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes et al., "The secoqc quantum key distribution network in vienna," New Journal of Physics, vol. 11, no. 7, p. 075001, 2009. https://doi.org/10.1088/1367-2630/11/7/075001
- M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka et al., "Field test of quantum key distribution in the tokyo qkd network," Optics Express, vol. 19, no. 11, pp. 10 387-10 409, 2011. https://doi.org/10.1364/OE.19.010387
- C. H. Bennett, G. Brassard et al., "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, no. 0. New York, 1984.
- D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, "Quantum privacy amplification and the security of quantum cryptography over noisy channels," Physical Review Letters, vol. 77, no. 13, p. 2818, 1996. https://doi.org/10.1103/PhysRevLett.77.2818
- H. Bechmann-Pasquinucci and N. Gisin, "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography," Physical Review A, vol. 59, no. 6, p. 4238, 1999. https://doi.org/10.1103/PhysRevA.59.4238
- J.-D. Wang, Z.-J. Wei, H. Zhang, X.-J. Qin, X.-B. Liu, Z.-M. Zhang, C.-J. Liao, and S.-H. Liu, "Efficient quantum key distribution via singlephoton two-qubit states," Journal of Physics B: Atomic, Molecular and Optical Physics, vol. 43, no. 9, p. 095504, 2010. https://doi.org/10.1088/0953-4075/43/9/095504
- W. K. Wootters and W. H. Zurek, "A single quantum cannot be cloned,"Nature, vol. 299, no. 5886, pp. 802-803, 1982. https://doi.org/10.1038/299802a0
- C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, "Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy," Physical Review A, vol. 56, no. 2, p. 1163, 1997. https://doi.org/10.1103/PhysRevA.56.1163
- J. Cirac and N. Gisin, "Coherent eavesdropping strategies for the four state quantum cryptography protocol," Physics Letters A, vol. 229, no. 1, pp. 1-7, 1997. https://doi.org/10.1016/S0375-9601(97)00176-X
- N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of modern physics, vol. 74, no. 1, p. 145, 2002. https://doi.org/10.1103/RevModPhys.74.145
- E. Knill, R. Laflamme, and G. J. Milburn, "A scheme for efficient quantum computation with linear optics," Nature, vol. 409, no. 6816, pp. 46-52, 2001. https://doi.org/10.1038/35051009
- A. Peres, Quantum theory: concepts and methods. Springer, 1995, vol. 57.