Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions

S Nahar, D Tupkary, Y Zhao, N Lütkenhaus, EYZ Tan - PRX Quantum, 2024 - APS
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …

Preparing a commercial quantum key distribution system for certification against implementation loopholes

V Makarov, A Abrikosov, P Chaiwongkhot… - Physical Review …, 2024 - APS
A commercial quantum key distribution (QKD) system needs to be formally certified to
enable its wide deployment. The certification should include the system's robustness against …

Security of the decoy-state BB84 protocol with imperfect state preparation

A Reutov, A Tayduganov, V Mayboroda, O Fat'yanov - Entropy, 2023 - mdpi.com
The quantum key distribution (QKD) allows two remote users to share a common information-
theoretic secure secret key. In order to guarantee the security of a practical QKD …

[HTML][HTML] Optimizing QKD efficiency by addressing chromatic dispersion and time measurement uncertainty

A Czerwinski, S Haddadi - Physics Letters A, 2024 - Elsevier
In this paper, we present a Quantum Key Distribution (QKD) protocol that accounts for
fundamental practical challenges, including chromatic dispersion, time measurement …

Loss-tolerant quantum key distribution with detection efficiency mismatch

A Marcomini, A Mizutani, F Grünenfelder… - arxiv preprint arxiv …, 2024 - arxiv.org
Current implementations of quantum key distribution (QKD) typically rely on prepare-and-
measure (P&M) schemes. Unfortunately, these implementations are not completely secure …

Security of practical modulator-free quantum key distribution

Á Navarrete, V Zapatero, M Curty - arxiv preprint arxiv:2411.15777, 2024 - arxiv.org
Recent advancements in quantum key distribution have led to the development of various
modulator-free transmitters. Among their advantages, these transmitters offer enhanced …

Phase error rate estimation in QKD with imperfect detectors

D Tupkary, S Nahar, P Sinha, N Lütkenhaus - arxiv preprint arxiv …, 2024 - arxiv.org
We present a finite-size security proof of the decoy-state BB84 QKD protocol against
coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this …

Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security

A Sykot, MS Azad, WR Tanha, BM Morshed… - arxiv preprint arxiv …, 2024 - arxiv.org
In this paper, we present a novel cryptographic system that integrates Quantum Key
Distribution (QKD) with classical encryption techniques to secure steganographic images …

Securing Mobile Adhoc Network with Quantum Key Distribution: An Experimental Analysis

S Thapa, A Bandyopadhyay… - 2024 4th …, 2024 - ieeexplore.ieee.org
Mobile adhoc networks (MANETs) are characterized by their dynamic and decentralized
nature, making them inherently vulnerable to security threats. This paper proposes a novel …