Security of device-independent quantum key distribution protocols: a review
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
[HTML][HTML] Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources
The security of quantum key distribution (QKD) is severely threatened by discrepancies
between realistic devices and theoretical assumptions. Recently, a significant framework …
between realistic devices and theoretical assumptions. Recently, a significant framework …
Experimental quantum e-commerce
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
Experimental demonstration of fully passive quantum key distribution
The passive approach to quantum key distribution (QKD) consists of removing all active
modulation from the users' devices, a highly desirable countermeasure to get rid of …
modulation from the users' devices, a highly desirable countermeasure to get rid of …
Implementation security in quantum key distribution
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
Modified BB84 quantum key distribution protocol robust to source imperfections
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …
Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks
Most security proofs of quantum key distribution (QKD) disregard the effect of information
leakage from the users' devices, and, thus, do not protect against Trojan-horse attacks …
leakage from the users' devices, and, thus, do not protect against Trojan-horse attacks …
Imperfect phase randomization and generalized decoy-state quantum key distribution
Decoy-state methods are essential to perform quantum key distribution (QKD) at large
distances in the absence of single-photon sources. However, the standard techniques apply …
distances in the absence of single-photon sources. However, the standard techniques apply …
Characterization of state-preparation uncertainty in quantum key distribution
To achieve secure quantum key distribution, all imperfections in the source unit must be
incorporated in a security proof and measured in the lab. Here we perform a proof-of …
incorporated in a security proof and measured in the lab. Here we perform a proof-of …
Improved finite-key security analysis of measurement-device-independent quantum key distribution against a trojan-horse attack
Measurement-device-independent quantum key distribution (MDI QKD) is a promising
method for remote key sharing that can eliminate all detector side-channel attacks. However …
method for remote key sharing that can eliminate all detector side-channel attacks. However …