Quantum communication using semiconductor quantum dots

DA Vajner, L Rickert, T Gao… - Advanced Quantum …, 2022 - Wiley Online Library
Worldwide, enormous efforts are directed toward the development of the so‐called quantum
internet. Turning this long‐sought‐after dream into reality is a great challenge that will …

Security of quantum key distribution from generalised entropy accumulation

T Metger, R Renner - Nature Communications, 2023 - nature.com
The goal of quantum key distribution (QKD) is to establish a secure key between two parties
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …

Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions

S Nahar, D Tupkary, Y Zhao, N Lütkenhaus, EYZ Tan - PRX Quantum, 2024 - APS
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …

Dimension reduction in quantum key distribution for continuous-and discrete-variable protocols

T Upadhyaya, T van Himbeeck, J Lin, N Lütkenhaus - PRX Quantum, 2021 - APS
We develop a method to connect the infinite-dimensional description of optical continuous-
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …

Advances in artificial intelligence and machine learning for quantum communication applications

M Mafu - IET Quantum Communication, 2024 - Wiley Online Library
Artificial intelligence (AI) and classical machine learning (ML) techniques have
revolutionised numerous fields, including quantum communication. Quantum …

Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment

W Wang, N Lütkenhaus - Physical Review Research, 2022 - APS
In this work, we incorporate decoy-state analysis into a well-established numerical
framework for key rate calculation, and we apply the numerical framework to decoy-state …

Trusted detector noise analysis for discrete modulation schemes of continuous-variable quantum key distribution

J Lin, N Lütkenhaus - Physical Review Applied, 2020 - APS
Discrete-modulated continuous-variable quantum key distribution protocols are promising
candidates for large-scale deployment due to the large technological overlap with deployed …

Neural network-based prediction of the secret-key rate of quantum key distribution

MG Zhou, ZP Liu, WB Liu, CL Li, JL Bai, YR Xue… - Scientific Reports, 2022 - nature.com
Numerical methods are widely used to calculate the secure key rate of many quantum key
distribution protocols in practice, but they consume many computing resources and are too …

Using Cascade in quantum key distribution

D Tupkary, N Lütkenhaus - Physical Review Applied, 2023 - APS
We point out a critical flaw in the analysis of quantum key distribution protocols that employ
the two-way error-correction protocol Cascade. Specifically, this flaw stems from an …

Security proof for variable-length quantum key distribution

D Tupkary, EYZ Tan, N Lütkenhaus - Physical Review Research, 2024 - APS
We present a security proof for variable-length QKD in the Renner framework against IID
collective attacks. Our proof can be lifted to coherent attacks using the postselection …