Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution
Continuous-variable quantum key distribution (CV QKD) protocols with discrete modulation
are interesting due to their experimental simplicity and their great potential for massive …
are interesting due to their experimental simplicity and their great potential for massive …
Near-term quantum-repeater experiments with nitrogen-vacancy centers: Overcoming the limitations of direct transmission
Quantum channels enable the implementation of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret key. However …
classical counterparts. The most famous example is the distribution of secret key. However …
Reliable numerical key rates for quantum key distribution
In this work, we present a reliable, efficient, and tight numerical method for calculating key
rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our …
rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our …
Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …
quantum key distribution protocols against coherent attacks via the uplift of any security …
Quantum randomness certified by the uncertainty principle
We present an efficient method to extract the amount of true randomness that can be
obtained by a quantum random number generator (QRNG). By repeating the measurements …
obtained by a quantum random number generator (QRNG). By repeating the measurements …
Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution
An on-demand source of bright entangled photon pairs is desirable for quantum key
distribution (QKD) and quantum repeaters. The leading candidate to generate such pairs is …
distribution (QKD) and quantum repeaters. The leading candidate to generate such pairs is …
Dimension reduction in quantum key distribution for continuous-and discrete-variable protocols
We develop a method to connect the infinite-dimensional description of optical continuous-
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector
channels may depend differently on the spatial mode of incoming photons. Consequently …
channels may depend differently on the spatial mode of incoming photons. Consequently …
Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions
D Orsucci, P Kleinpaß, J Meister… - … Journal of Satellite …, 2024 - Wiley Online Library
Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the
computational hardness paradigm and is befitting for secure data transmission requiring …
computational hardness paradigm and is befitting for secure data transmission requiring …
Parameter regimes for a single sequential quantum repeater
Quantum key distribution allows for the generation of a secret key between distant parties
connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate …
connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate …