|
[1]
|
李宏欣, 李瞻, 闫宝, 韩宇, 王伟, 山灵. 全球量子保密通信技术进展研究[J]. 计算机科学与应用, 2017, 7(1): 74- 87.
|
|
[2]
|
Deng, F.G., Li, X.H. and Zhou, H.Y. (2005) Improving the Security of Multiparty Quantum Secret Sharing against Trojan-Horse Attack. Physical Review A, 72, 440-450. [Google Scholar] [CrossRef]
|
|
[3]
|
Deng, F.G., Zhou, P. and Li, X.H. (2005) Robustness of Two-Way Quantum Communication Protocols against Trojan- Horse Attack. http://arxiv.org/abs/quant-ph/0508168
|
|
[4]
|
Yang, Y.G., Sun, S.J. and Zhao, Q.Q. (2014) Trojan-Horse Attacks on Quantum Key Distribution with Classical Bob. Quantum Information Processing, 14, 681-686. [Google Scholar] [CrossRef]
|
|
[5]
|
马鸿洋, 范兴奎. 抗特洛伊木马攻击的量子密钥多播通信协议[J]. 通信学报, 2014, 35(7): 193-198.
|
|
[6]
|
Jain, N., Anisimova, E. and Khan, I. (2014) Trojan-Horse Attacks Threaten the Security of Practical Quantum Cryptography. New Journal of Physics, 16, 123030-123051. [Google Scholar] [CrossRef]
|
|
[7]
|
Jain, N., Stiller, B. and Khan, I. (2014) Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems. IEEE Journal of Selected Topics in Quantum Electronics, 21, 168-177. [Google Scholar] [CrossRef]
|
|
[8]
|
Yang, X.Q., Wei, K. and Ma, H. (2015) Trojan-Horse Attacks on Counterfactual Quantum Key Distribution. Physics Letters A, 380, 1589-1592. [Google Scholar] [CrossRef]
|
|
[9]
|
Lucamarini, M., Choi, I. and Ward, M.B. (2015) Practical Security Bounds against the Trojan-Horse Attack in Quantum Key Distribution. Physical Review X, 5, 1030-1056. [Google Scholar] [CrossRef]
|
|
[10]
|
Ma, H.X., Bao, W.S., et al. (2016) Quantum Hacking of Two-Way Continuous-Variable Quantum Key Distribution Using Trojan-Horse Attack. Chinese Physics B, 25, 080309. [Google Scholar] [CrossRef]
|
|
[11]
|
Ekert, A.K. (1991) Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters, 67, 661-663. [Google Scholar] [CrossRef]
|
|
[12]
|
Gisin, N., Ribordy, G., Tittel, W., et al. (2002)Quantum Cryptography. Reviews of Modern Physics, 74, 145-195. [Google Scholar] [CrossRef]
|