Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Quantum cryptography

N Gisin, G Ribordy, W Tittel, H Zbinden - Reviews of modern physics, 2002 - APS
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …

Overcoming the rate–distance limit of quantum key distribution without quantum repeaters

M Lucamarini, ZL Yuan, JF Dynes, AJ Shields - Nature, 2018 - nature.com
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …

Quantum information with continuous variables

SL Braunstein, P Van Loock - Reviews of modern physics, 2005 - APS
Quantum information is a rapidly advancing area of interdisciplinary research. It may lead to
real-world applications for communication and computation unavailable without the …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Decoy state quantum key distribution

HK Lo, X Ma, K Chen - Physical review letters, 2005 - APS
There has been much interest in quantum key distribution. Experimentally, quantum key
distribution over 150 km of commercial Telecom fibers has been successfully performed …

[BOOK][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Wireless information-theoretic security

M Bloch, J Barros, MRD Rodrigues… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
This paper considers the transmission of confidential data over wireless channels. Based on
an information-theoretic formulation of the problem, in which two legitimates partners …

Generalized privacy amplification

CH Bennett, G Brassard, C Crépeau… - IEEE Transactions on …, 1995 - ieeexplore.ieee.org
This paper, provides a general treatment of privacy amplification by public discussion, a
concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy …

Quantum key distribution using gaussian-modulated coherent states

F Grosshans, G Van Assche, J Wenger, R Brouri… - Nature, 2003 - nature.com
Quantum continuous variables are being explored,,,,,,,,,,,, as an alternative means to
implement quantum key distribution, which is usually based on single photon counting. The …