Quantum communication using semiconductor quantum dots
Worldwide, enormous efforts are directed toward the development of the so‐called quantum
internet. Turning this long‐sought‐after dream into reality is a great challenge that will …
internet. Turning this long‐sought‐after dream into reality is a great challenge that will …
Security of quantum key distribution from generalised entropy accumulation
The goal of quantum key distribution (QKD) is to establish a secure key between two parties
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …
quantum key distribution protocols against coherent attacks via the uplift of any security …
Dimension reduction in quantum key distribution for continuous-and discrete-variable protocols
We develop a method to connect the infinite-dimensional description of optical continuous-
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
Advances in artificial intelligence and machine learning for quantum communication applications
M Mafu - IET Quantum Communication, 2024 - Wiley Online Library
Artificial intelligence (AI) and classical machine learning (ML) techniques have
revolutionised numerous fields, including quantum communication. Quantum …
revolutionised numerous fields, including quantum communication. Quantum …
Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
In this work, we incorporate decoy-state analysis into a well-established numerical
framework for key rate calculation, and we apply the numerical framework to decoy-state …
framework for key rate calculation, and we apply the numerical framework to decoy-state …
Trusted detector noise analysis for discrete modulation schemes of continuous-variable quantum key distribution
Discrete-modulated continuous-variable quantum key distribution protocols are promising
candidates for large-scale deployment due to the large technological overlap with deployed …
candidates for large-scale deployment due to the large technological overlap with deployed …
Neural network-based prediction of the secret-key rate of quantum key distribution
Numerical methods are widely used to calculate the secure key rate of many quantum key
distribution protocols in practice, but they consume many computing resources and are too …
distribution protocols in practice, but they consume many computing resources and are too …
Using Cascade in quantum key distribution
We point out a critical flaw in the analysis of quantum key distribution protocols that employ
the two-way error-correction protocol Cascade. Specifically, this flaw stems from an …
the two-way error-correction protocol Cascade. Specifically, this flaw stems from an …
Security proof for variable-length quantum key distribution
We present a security proof for variable-length QKD in the Renner framework against IID
collective attacks. Our proof can be lifted to coherent attacks using the postselection …
collective attacks. Our proof can be lifted to coherent attacks using the postselection …