Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Distributing secret keys with quantum continuous variables: principle, security and implementations
The ability to distribute secret keys between two parties with information-theoretic security,
that is regardless of the capacities of a malevolent eavesdropper, is one of the most …
that is regardless of the capacities of a malevolent eavesdropper, is one of the most …
[HTML][HTML] Fundamental limits of repeaterless quantum communications
Quantum communications promises reliable transmission of quantum information, efficient
distribution of entanglement and generation of completely secure keys. For all these tasks …
distribution of entanglement and generation of completely secure keys. For all these tasks …
Measurement-device-independent quantum secure direct communication
Quantum secure direct communication (QSDC) is a unique technique, which supports the
secure transmission of confidential information directly through a quantum channel without …
secure transmission of confidential information directly through a quantum channel without …
Satellite-based continuous-variable quantum communications: State-of-the-art and a predictive outlook
The recent launch of the Micius quantum-enabled satellite heralds a major step forward for
long-range quantum communication. Using single-photon discrete-variable quantum states …
long-range quantum communication. Using single-photon discrete-variable quantum states …
Theory of channel simulation and bounds for private communication
We review recent results on the simulation of quantum channels, the reduction of adaptive
protocols (teleportation stretching), and the derivation of converse bounds for quantum and …
protocols (teleportation stretching), and the derivation of converse bounds for quantum and …
Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
We identify and study a security loophole in continuous-variable quantum key distribution
(CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By …
(CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By …
Continuous-variable measurement-device-independent quantum key distribution with photon subtraction
It has been found that non-Gaussian operations can be applied to increase and distill
entanglement between Gaussian entangled states. We show the successful use of the non …
entanglement between Gaussian entangled states. We show the successful use of the non …
Continuous-variable measurement-device-independent multipartite quantum communication
A continuous-variable measurement-device-independent multiparty quantum
communication protocol is investigated in this paper. Utilizing the distributed continuous …
communication protocol is investigated in this paper. Utilizing the distributed continuous …
Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables
We study the impact of finite-size effects on the key rate of continuous-variable (CV)
measurement-device-independent (MDI) quantum key distribution (QKD), considering two …
measurement-device-independent (MDI) quantum key distribution (QKD), considering two …