Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …
quantum key distribution protocols against coherent attacks via the uplift of any security …
Implementation security in quantum key distribution
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
Preparing a commercial quantum key distribution system for certification against implementation loopholes
V Makarov, A Abrikosov, P Chaiwongkhot… - Physical Review …, 2024 - APS
A commercial quantum key distribution (QKD) system needs to be formally certified to
enable its wide deployment. The certification should include the system's robustness against …
enable its wide deployment. The certification should include the system's robustness against …
Security of the decoy-state BB84 protocol with imperfect state preparation
A Reutov, A Tayduganov, V Mayboroda, O Fat'yanov - Entropy, 2023 - mdpi.com
The quantum key distribution (QKD) allows two remote users to share a common information-
theoretic secure secret key. In order to guarantee the security of a practical QKD …
theoretic secure secret key. In order to guarantee the security of a practical QKD …
[HTML][HTML] Optimizing QKD efficiency by addressing chromatic dispersion and time measurement uncertainty
In this paper, we present a Quantum Key Distribution (QKD) protocol that accounts for
fundamental practical challenges, including chromatic dispersion, time measurement …
fundamental practical challenges, including chromatic dispersion, time measurement …
Loss-tolerant quantum key distribution with detection efficiency mismatch
Current implementations of quantum key distribution (QKD) typically rely on prepare-and-
measure (P&M) schemes. Unfortunately, these implementations are not completely secure …
measure (P&M) schemes. Unfortunately, these implementations are not completely secure …
Security of practical modulator-free quantum key distribution
Recent advancements in quantum key distribution have led to the development of various
modulator-free transmitters. Among their advantages, these transmitters offer enhanced …
modulator-free transmitters. Among their advantages, these transmitters offer enhanced …
Phase error rate estimation in QKD with imperfect detectors
We present a finite-size security proof of the decoy-state BB84 QKD protocol against
coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this …
coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this …
Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security
In this paper, we present a novel cryptographic system that integrates Quantum Key
Distribution (QKD) with classical encryption techniques to secure steganographic images …
Distribution (QKD) with classical encryption techniques to secure steganographic images …
Securing Mobile Adhoc Network with Quantum Key Distribution: An Experimental Analysis
S Thapa, A Bandyopadhyay… - 2024 4th …, 2024 - ieeexplore.ieee.org
Mobile adhoc networks (MANETs) are characterized by their dynamic and decentralized
nature, making them inherently vulnerable to security threats. This paper proposes a novel …
nature, making them inherently vulnerable to security threats. This paper proposes a novel …