Finite-key security analysis of differential-phase-shift quantum key distribution

A Mizutani, Y Takeuchi, K Tamaki - Physical Review Research, 2023 - APS
Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the major QKD
protocols that can be implemented with a simple setup using a laser source and a passive …

[HTML][HTML] Quantum key distribution with flawed and leaky sources

M Pereira, M Curty, K Tamaki - npj Quantum Information, 2019 - nature.com
In theory, quantum key distribution (QKD) allows secure communications between two
parties based on physical laws. However, most of the security proofs of QKD today make …

Measurement-device-independent quantum key distribution with leaky sources

W Wang, K Tamaki, M Curty - Scientific reports, 2021 - nature.com
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all
detection side-channels from quantum communication systems. The security proofs require …

Finite-key security analysis for quantum key distribution with leaky sources

W Wang, K Tamaki, M Curty - New Journal of Physics, 2018 - iopscience.iop.org
Security proofs of quantum key distribution (QKD) typically assume that the devices of the
legitimate users are perfectly shielded from the eavesdropper. This assumption is, however …

Quantum key distribution with setting-choice-independently correlated light sources

A Mizutani, G Kato, K Azuma, M Curty, R Ikuta… - npj Quantum …, 2019 - nature.com
Despite the enormous theoretical and experimental progress made so far in quantum key
distribution (QKD), the security of most existing practical QKD systems is not rigorously …

Simultaneous Basis and Information Reconciliation in Quantum Key Distribution

J Martinez-Mateo, D Elkouss - IEEE Access, 2024 - ieeexplore.ieee.org
We consider in this paper the practical implementation of a siftingless quantum key
distribution protocol. The protocol is considered siftingless since it combines sifting and error …

Tight finite-key analysis for quantum key distribution without monitoring signal disturbance

H Liu, ZQ Yin, R Wang, ZH Wang, S Wang… - npj Quantum …, 2021 - nature.com
Unlike traditional communication, quantum key distribution (QKD) can reach unconditional
security and thus attracts intensive studies. Among all existing QKD protocols, round-robin …

Quality of Service Requirements

M Mehic, S Rass, P Fazio, M Voznak - Quantum Key Distribution Networks …, 2022 - Springer
Modern telecommunications networks are based on packet-switching traffic processing and
the methodology by which packets can be delivered using an arbitrary route. However, for …

[PDF][PDF] Communication distance and security improvement in satellite based quantum key distribution via photon polarization pseudo-random bases encoding

TA Giresse, YD Germain, A KOUMETIO, TM Armel - events.saip.org.za
New protocol to achieve very long-distance and secure communication between two
legitimate users (Alice and Bob) namely, the pseudo-random entangled photon based QKD …

Implementation security of quantum key distribution

MA Freitas Pereira - 2021 - investigo.biblioteca.uvigo.es
The main goal of this research project is to analyse the security of practical implementations
of discrete-variable QKD systems. While it is true that in theory QKD can offer unconditional …