2011
DOI: 10.1007/s11434-010-4208-y
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution using four-level particles

Abstract: We present a quantum key distribution protocol based on four-level particle entanglement. Furthermore, a controlled quantum key distribution protocol is proposed using three four-level particles. We show that the two protocols are secure. quantum key distribution, four-level particles, entanglement Citation:Yan T, Yan F L. Quantum key distribution using four-level particles. Chinese Sci Bull, 2011Bull, , 56: 24−28, doi: 10.1007 Quantum key distribution (QKD) is one of the most important branches of quantum cr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…In this section, we will review the recent QKD protocols. Since Bennett and Brassard presented the BB84 QKD protocol [7], quantum key distribution has progressed quickly [11,51,[56][57][58][59][60][61].…”
Section: Quantum Key Distributionmentioning
confidence: 99%
“…In this section, we will review the recent QKD protocols. Since Bennett and Brassard presented the BB84 QKD protocol [7], quantum key distribution has progressed quickly [11,51,[56][57][58][59][60][61].…”
Section: Quantum Key Distributionmentioning
confidence: 99%
“…In the field of Cryptography, researchers in China have made a lot of progresses in recent years [2][3][4][5], which certainly provides a strong support for the development of trusted computing. In December 2007, State Cryptography Administration Bureau of China published the functionality and interface specification of cryptographic support platform for trusted computing [6], which marks a new stage of the development of trusted computing in China.…”
Section: Trusted Computing Infrastructurementioning
confidence: 99%
“…In the past few years, many quantum authentication protocols have been proposed to authenticate quantum messages [7,[9][10][11][12]. However, in the communication world, classical messages are widely used.…”
Section: Introductionmentioning
confidence: 99%