Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Overcoming the rate–distance limit of quantum key distribution without quantum repeaters
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …
security based on physical laws. Experimentally, QKD has been implemented via optical …
Mixed-state entanglement and quantum error correction
Entanglement purification protocols (EPPs) and quantum error-correcting codes (QECCs)
provide two ways of protecting quantum states from interaction with the environment. In an …
provide two ways of protecting quantum states from interaction with the environment. In an …
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary research. It may lead to
real-world applications for communication and computation unavailable without the …
real-world applications for communication and computation unavailable without the …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
[BOOK][B] Information theory: coding theorems for discrete memoryless systems
I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …
providing deep insights and expert treatment of the key theoretical issues. It includes in …
Purification of noisy entanglement and faithful teleportation via noisy channels
Two separated observers, by applying local operations to a supply of not-too-impure
entangled states (eg, singlets shared through a noisy channel), can prepare a smaller …
entangled states (eg, singlets shared through a noisy channel), can prepare a smaller …
[HTML][HTML] Invited review article: Single-photon sources and detectors
We review the current status of single-photon-source and single-photon-detector
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …