Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Continuous‐variable quantum key distribution with Gaussian modulation—the theory of practical implementations
F Laudenbach, C Pacher, CHF Fung… - Advanced Quantum …, 2018 - Wiley Online Library
Quantum key distribution (QKD) using weak coherent states and homodyne detection is a
promising candidate for practical quantum‐cryptographic implementations due to its …
promising candidate for practical quantum‐cryptographic implementations due to its …
Long-distance continuous-variable quantum key distribution over 202.81 km of fiber
Quantum key distribution provides secure keys resistant to code-breaking quantum
computers. The continuous-variable version of quantum key distribution offers the …
computers. The continuous-variable version of quantum key distribution offers the …
[LLIBRE][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Wireless information-theoretic security
This paper considers the transmission of confidential data over wireless channels. Based on
an information-theoretic formulation of the problem, in which two legitimates partners …
an information-theoretic formulation of the problem, in which two legitimates partners …
Composable security proof for continuous-variable quantum key distribution with coherent states
A Leverrier - Physical review letters, 2015 - APS
We give the first composable security proof for continuous-variable quantum key distribution
with coherent states against collective attacks. Crucially, in the limit of large blocks the secret …
with coherent states against collective attacks. Crucially, in the limit of large blocks the secret …
Single-nanowire electrically driven lasers
Electrically driven semiconductor lasers are used in technologies ranging from
telecommunications and information storage to medical diagnostics and therapeutics. The …
telecommunications and information storage to medical diagnostics and therapeutics. The …
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored,,,,,,,,,,,, as an alternative means to
implement quantum key distribution, which is usually based on single photon counting. The …
implement quantum key distribution, which is usually based on single photon counting. The …
The SECOQC quantum key distribution network in Vienna
In this paper, we present the quantum key distribution (QKD) network designed and
implemented by the European project SEcure COmmunication based on Quantum …
implemented by the European project SEcure COmmunication based on Quantum …