The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Advanced laser technology for quantum communications (tutorial review)
Quantum communications is the art of exchanging and manipulating information beyond the
capabilities of the conventional technologies using the laws of quantum mechanics. With …
capabilities of the conventional technologies using the laws of quantum mechanics. With …
Measurement-device-independent quantum key distribution
How to remove detector side channel attacks has been a notoriously hard problem in
quantum cryptography. Here, we propose a simple solution to this problem—measurement …
quantum cryptography. Here, we propose a simple solution to this problem—measurement …
Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system
With the help of quantum key distribution (QKD), two distant peers are able to share
information-theoretical secure key bits. Increasing the key rate is ultimately significant for the …
information-theoretical secure key bits. Increasing the key rate is ultimately significant for the …
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution
We demonstrate the first implementation of polarization encoding measurement-device-
independent quantum key distribution (MDI-QKD), which is immune to all detector side …
independent quantum key distribution (MDI-QKD), which is immune to all detector side …
Real-World Two-Photon Interference and Proof-of-Principle<? format?> Quantum Key Distribution Immune to Detector Attacks
A Rubenok, JA Slater, P Chan, I Lucio-Martinez… - Physical review …, 2013 - APS
Several vulnerabilities of single-photon detectors have recently been exploited to
compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report …
compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report …
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
We perform a proof-of-principle demonstration of the measurement-device-independent
quantum key distribution protocol using weak coherent states and polarization-encoded …
quantum key distribution protocol using weak coherent states and polarization-encoded …
Practical security bounds against the trojan-horse attack in quantum key distribution
In the quantum version of a Trojan-horse attack, photons are injected into the optical
modules of a quantum key distribution system in an attempt to read information direct from …
modules of a quantum key distribution system in an attempt to read information direct from …
High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers
Multiplexing is a strategy to augment the transmission capacity of a communication system. It
consists of combining multiple signals over the same data channel and it has been very …
consists of combining multiple signals over the same data channel and it has been very …
Experimental demonstration of a quantum key distribution without signal disturbance monitoring
In existing quantum key distribution protocols, two legitimate peers, Alice and Bob, must
monitor the signal disturbance to place a bound on the potential information leakage …
monitor the signal disturbance to place a bound on the potential information leakage …