Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020‏ - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022‏ - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Phase-matching quantum key distribution

X Ma, P Zeng, H Zhou - Physical Review X, 2018‏ - APS
Quantum key distribution allows remote parties to generate information-theoretic secure
keys. The bottleneck throttling its real-life applications lies in the limited communication …

Secure quantum key distribution

HK Lo, M Curty, K Tamaki - Nature Photonics, 2014‏ - nature.com
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised
to revolutionize cryptography as we know it today. In this Review, we introduce the …

Quantum random number generation

X Ma, X Yuan, Z Cao, B Qi, Z Zhang - npj Quantum Information, 2016‏ - nature.com
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …

Security of quantum key distribution

R Renner - International Journal of Quantum Information, 2008‏ - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

T Gehring, V Händchen, J Duhme, F Furrer… - Nature …, 2015‏ - nature.com
Secret communication over public channels is one of the central pillars of a modern
information society. Using quantum key distribution this is achieved without relying on the …

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems

Y Zhao, CHF Fung, B Qi, C Chen, HK Lo - Physical Review A—Atomic …, 2008‏ - APS
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100 km
standard optical fiber and are widely believed to be secure. Here, we show experimentally a …

Security of device-independent quantum key distribution protocols: a review

IW Primaatmaja, KT Goh, EYZ Tan, JTF Khoo… - Quantum, 2023‏ - quantum-journal.org
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …

Quantum and relativistic protocols for secure multi-party computation

R Colbeck - arxiv preprint arxiv:0911.3814, 2009‏ - arxiv.org
After a general introduction, the thesis is divided into four parts. In the first, we discuss the
task of coin tossing, principally in order to highlight the effect different physical theories have …