Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Overcoming the rate–distance limit of quantum key distribution without quantum repeaters
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …
security based on physical laws. Experimentally, QKD has been implemented via optical …
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary research. It may lead to
real-world applications for communication and computation unavailable without the …
real-world applications for communication and computation unavailable without the …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Decoy state quantum key distribution
There has been much interest in quantum key distribution. Experimentally, quantum key
distribution over 150 km of commercial Telecom fibers has been successfully performed …
distribution over 150 km of commercial Telecom fibers has been successfully performed …
[BOOK][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Wireless information-theoretic security
This paper considers the transmission of confidential data over wireless channels. Based on
an information-theoretic formulation of the problem, in which two legitimates partners …
an information-theoretic formulation of the problem, in which two legitimates partners …
Generalized privacy amplification
This paper, provides a general treatment of privacy amplification by public discussion, a
concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy …
concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy …
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored,,,,,,,,,,,, as an alternative means to
implement quantum key distribution, which is usually based on single photon counting. The …
implement quantum key distribution, which is usually based on single photon counting. The …