Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The evolution of quantum key distribution networks: On the road to the qinternet
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …
capable of maintaining information-theoretic security. Given the recent advances in QKD …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Fast single-photon detectors and real-time key distillation enable high secret-key-rate quantum key distribution systems
Quantum key distribution has emerged as the most viable scheme to guarantee information
security in the presence of large-scale quantum computers and, thanks to the continuous …
security in the presence of large-scale quantum computers and, thanks to the continuous …
Superconducting nanowire single-photon detectors: physics and applications
Single-photon detectors based on superconducting nanowires (SSPDs or SNSPDs) have
rapidly emerged as a highly promising photon-counting technology for infrared wavelengths …
rapidly emerged as a highly promising photon-counting technology for infrared wavelengths …
Side-channel-free quantum key distribution
Quantum key distribution (QKD) offers the promise of absolutely secure communications.
However, proofs of absolute security often assume perfect implementation from theory to …
However, proofs of absolute security often assume perfect implementation from theory to …
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
T Gehring, V Händchen, J Duhme, F Furrer… - Nature …, 2015 - nature.com
Secret communication over public channels is one of the central pillars of a modern
information society. Using quantum key distribution this is achieved without relying on the …
information society. Using quantum key distribution this is achieved without relying on the …
Implementation security in quantum key distribution
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
Laser-seeding attack in quantum key distribution
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw
In this paper, we study the unconditional security of the so-called measurement-device-
independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the …
independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the …
Homodyne-detector-blinding attack in continuous-variable quantum key distribution
We propose an efficient strategy to attack a continuous-variable (CV) quantum key
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …