The evolution of quantum key distribution networks: On the road to the qinternet
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …
capable of maintaining information-theoretic security. Given the recent advances in QKD …
Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Practical challenges in quantum key distribution
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
Long-distance continuous-variable quantum key distribution by controlling excess noise
Quantum cryptography founded on the laws of physics could revolutionize the way in which
communication information is protected. Significant progresses in long-distance quantum …
communication information is protected. Significant progresses in long-distance quantum …
Practical security bounds against the trojan-horse attack in quantum key distribution
In the quantum version of a Trojan-horse attack, photons are injected into the optical
modules of a quantum key distribution system in an attempt to read information direct from …
modules of a quantum key distribution system in an attempt to read information direct from …
Decoy-state quantum key distribution with a leaky source
In recent years, there has been a great effort to prove the security of quantum key distribution
(QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this …
(QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this …
Attacks on practical quantum key distribution systems (and how to prevent them)
With the emergence of an information society, the idea of protecting sensitive data is steadily
gaining importance. Conventional encryption methods may not be sufficient to guarantee …
gaining importance. Conventional encryption methods may not be sufficient to guarantee …
Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses
K Yoshino, M Fujiwara, K Nakata, T Sumiya… - npj Quantum …, 2018 - nature.com
Quantum key distribution (QKD) allows two distant parties to share secret keys with the
proven security even in the presence of an eavesdropper with unbounded computational …
proven security even in the presence of an eavesdropper with unbounded computational …
Round-trip multi-band quantum access network
The quantum network makes use of quantum states to transmit data, which will revolutionize
classical communication and allow for some breakthrough applications. Quantum key …
classical communication and allow for some breakthrough applications. Quantum key …