Quantum Information Processing, Sensing, and Communications: Their Myths, Realities, and Futures

L Hanzo, Z Babar, Z Cai, D Chandra… - Proceedings of the …, 2025 - ieeexplore.ieee.org
The recent advances in quantum information processing, sensing, and communications are
surveyed with the objective of identifying the associated knowledge gaps and formulating a …

Collective attack free controlled quantum key agreement without quantum memory

A Dutta, A Pathak - Physica Scripta, 2023 - iopscience.iop.org
Here we present a new protocol for controlled quantum key agreement and another protocol
for key agreement with a specific focus on the security analysis. Specifically, detailed …

Security of partially corrupted quantum repeater networks

A Harkness, WO Krawec, B Wang - Quantum Science and …, 2024 - iopscience.iop.org
Abstract Quantum Key Distribution allows two parties to establish a secret key that is secure
against computationally unbounded adversaries. To extend the distance between parties …

Efficient source-independent quantum conference key agreement

Y Bao, YR **ao, YC Song, XY Cao, Y Fu, HL Yin… - Optics …, 2024 - opg.optica.org
Quantum conference key agreement (QCKA) enables the unconditional secure distribution
of conference keys among multiple participants. Due to challenges in high-fidelity …

Quantum key distribution with displaced thermal states

A Walton, A Ghesquière, BTH Varcoe - Entropy, 2024 - mdpi.com
Secret key exchange relies on the creation of correlated signals, serving as the raw resource
for secure communication. Thermal states exhibit Hanbury Brown and Twiss correlations …

Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution

K Feng, Y Wang, Y Li, Y Wang, Z Zuo, Y Guo - Entropy, 2024 - mdpi.com
The wavelength attack utilizes the dependence of beam splitters (BSs) on wavelength to
cause legitimate users Alice and Bob to underestimate their excess noise so that Eve can …

Assessment of practical satellite quantum key distribution architectures for current and near-future missions

D Orsucci, P Kleinpaß, J Meister, I De Marco… - arxiv preprint arxiv …, 2024 - arxiv.org
Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the
computational hardness paradigm and is befitting for secure data transmission requiring …

Security of Partially Corrupted Repeater Chains

A Harkness, WO Krawec, B Wang - arxiv preprint arxiv:2406.16651, 2024 - arxiv.org
Quantum Key Distribution allows two parties to establish a secret key that is secure against
computationally unbounded adversaries. To extend the distance between parties, quantum …