Practical challenges in quantum key distribution

E Diamanti, HK Lo, B Qi, Z Yuan - npj Quantum Information, 2016 - nature.com
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …

A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …

Experimental demonstration of continuous-variable measurement-device-independent quantum key distribution over optical fiber

Y Tian, P Wang, J Liu, S Du, W Liu, Z Lu, X Wang, Y Li - Optica, 2022 - opg.optica.org
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all side-
channel attacks on detectors. In the context of the dramatic progress of discrete-variable MDI …

Measurement-device-independent quantum key distribution over untrustful metropolitan network

YL Tang, HL Yin, Q Zhao, H Liu, XX Sun, MQ Huang… - Physical Review X, 2016 - APS
Quantum cryptography holds the promise to establish an information-theoretically secure
global network. All field tests of metropolitan-scale quantum networks to date are based on …

Theory of channel simulation and bounds for private communication

S Pirandola, SL Braunstein, R Laurenza… - Quantum Science …, 2018 - iopscience.iop.org
We review recent results on the simulation of quantum channels, the reduction of adaptive
protocols (teleportation stretching), and the derivation of converse bounds for quantum and …

Quantum cryptography: Key distribution and beyond

A Pathak, R Srikanth - arxiv preprint arxiv:1802.05517, 2018 - arxiv.org
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …

Homodyne-detector-blinding attack in continuous-variable quantum key distribution

H Qin, R Kumar, V Makarov, R Alléaume - Physical Review A, 2018 - APS
We propose an efficient strategy to attack a continuous-variable (CV) quantum key
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …

Capacities of repeater-assisted quantum communications

S Pirandola - arxiv preprint arxiv:1601.00966, 2016 - arxiv.org
We consider quantum and private communications assisted by repeaters, from the basic
scenario of a single repeater chain to the general case of an arbitrarily-complex quantum …

Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

C Lupo, C Ottaviani, P Papanastasiou, S Pirandola - Physical Review A, 2018 - APS
We present a rigorous security analysis of continuous-variable measurement-device-
independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security …

Experimental measurement-device-independent quantum key distribution with imperfect sources

Z Tang, K Wei, O Bedroya, L Qian, HK Lo - Physical Review A, 2016 - APS
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to
all detector side-channel attacks, is the most promising solution to the security issues in …