Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Quantum cryptography

N Gisin, G Ribordy, W Tittel, H Zbinden - Reviews of modern physics, 2002 - APS
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …

Overcoming the rate–distance limit of quantum key distribution without quantum repeaters

M Lucamarini, ZL Yuan, JF Dynes, AJ Shields - Nature, 2018 - nature.com
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …

Mixed-state entanglement and quantum error correction

CH Bennett, DP DiVincenzo, JA Smolin, WK Wootters - Physical Review A, 1996 - APS
Entanglement purification protocols (EPPs) and quantum error-correcting codes (QECCs)
provide two ways of protecting quantum states from interaction with the environment. In an …

Quantum information with continuous variables

SL Braunstein, P Van Loock - Reviews of modern physics, 2005 - APS
Quantum information is a rapidly advancing area of interdisciplinary research. It may lead to
real-world applications for communication and computation unavailable without the …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

[BOOK][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

Purification of noisy entanglement and faithful teleportation via noisy channels

CH Bennett, G Brassard, S Popescu, B Schumacher… - Physical review …, 1996 - APS
Two separated observers, by applying local operations to a supply of not-too-impure
entangled states (eg, singlets shared through a noisy channel), can prepare a smaller …

[HTML][HTML] Invited review article: Single-photon sources and detectors

MD Eisaman, J Fan, A Migdall… - Review of scientific …, 2011 - pubs.aip.org
We review the current status of single-photon-source and single-photon-detector
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …