Practical challenges in quantum key distribution
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
Experimental demonstration of continuous-variable measurement-device-independent quantum key distribution over optical fiber
Y Tian, P Wang, J Liu, S Du, W Liu, Z Lu, X Wang, Y Li - Optica, 2022 - opg.optica.org
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all side-
channel attacks on detectors. In the context of the dramatic progress of discrete-variable MDI …
channel attacks on detectors. In the context of the dramatic progress of discrete-variable MDI …
Measurement-device-independent quantum key distribution over untrustful metropolitan network
Quantum cryptography holds the promise to establish an information-theoretically secure
global network. All field tests of metropolitan-scale quantum networks to date are based on …
global network. All field tests of metropolitan-scale quantum networks to date are based on …
Theory of channel simulation and bounds for private communication
We review recent results on the simulation of quantum channels, the reduction of adaptive
protocols (teleportation stretching), and the derivation of converse bounds for quantum and …
protocols (teleportation stretching), and the derivation of converse bounds for quantum and …
Quantum cryptography: Key distribution and beyond
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Homodyne-detector-blinding attack in continuous-variable quantum key distribution
We propose an efficient strategy to attack a continuous-variable (CV) quantum key
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …
Capacities of repeater-assisted quantum communications
S Pirandola - arxiv preprint arxiv:1601.00966, 2016 - arxiv.org
We consider quantum and private communications assisted by repeaters, from the basic
scenario of a single repeater chain to the general case of an arbitrarily-complex quantum …
scenario of a single repeater chain to the general case of an arbitrarily-complex quantum …
Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks
We present a rigorous security analysis of continuous-variable measurement-device-
independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security …
independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security …
Experimental measurement-device-independent quantum key distribution with imperfect sources
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to
all detector side-channel attacks, is the most promising solution to the security issues in …
all detector side-channel attacks, is the most promising solution to the security issues in …