Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Overcoming the rate–distance limit of quantum key distribution without quantum repeaters
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …
security based on physical laws. Experimentally, QKD has been implemented via optical …
Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Key generation from wireless channels: A review
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …
public key cryptography for the establishment of cryptographic keys between any two users …
High-dimensional quantum cryptography with twisted light
Quantum key distribution (QKD) systems often rely on polarization of light for encoding, thus
limiting the amount of information that can be sent per photon and placing tight bounds on …
limiting the amount of information that can be sent per photon and placing tight bounds on …
[HTML][HTML] Invited review article: Single-photon sources and detectors
We review the current status of single-photon-source and single-photon-detector
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …
Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions
The advanced notebooks, mobile phones, and Internet applications in today's world that we
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …
Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …