Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Micius quantum experiments in space
Quantum theory has been successfully validated in numerous laboratory experiments. But
would such a theory, which effectively describes the behavior of microscopic physical …
would such a theory, which effectively describes the behavior of microscopic physical …
Adversarial discriminative domain adaptation
Adversarial learning methods are a promising approach to training robust deep networks,
and can generate complex samples across diverse domains. They can also improve …
and can generate complex samples across diverse domains. They can also improve …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …
as the hardness of prime factorization to provide security against eavesdrop** attacks …
Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …
quantum key distribution via single-photon interference. However, to compensate for the …
Secure quantum key distribution
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised
to revolutionize cryptography as we know it today. In this Review, we introduce the …
to revolutionize cryptography as we know it today. In this Review, we introduce the …
Mode-pairing quantum key distribution
Quantum key distribution—the establishment of information-theoretically secure keys based
on quantum physics—is mainly limited by its practical performance, which is characterised …
on quantum physics—is mainly limited by its practical performance, which is characterised …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Quantum dots for photonic quantum information technology
The generation, manipulation, storage, and detection of single photons play a central role in
emerging photonic quantum information technology. Individual photons serve as flying …
emerging photonic quantum information technology. Individual photons serve as flying …