The evolution of quantum key distribution networks: On the road to the qinternet

Y Cao, Y Zhao, Q Wang, J Zhang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …

Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Practical challenges in quantum key distribution

E Diamanti, HK Lo, B Qi, Z Yuan - npj Quantum Information, 2016 - nature.com
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …

Long-distance continuous-variable quantum key distribution by controlling excess noise

D Huang, P Huang, D Lin, G Zeng - Scientific reports, 2016 - nature.com
Quantum cryptography founded on the laws of physics could revolutionize the way in which
communication information is protected. Significant progresses in long-distance quantum …

Practical security bounds against the trojan-horse attack in quantum key distribution

M Lucamarini, I Choi, MB Ward, JF Dynes, ZL Yuan… - Physical Review X, 2015 - APS
In the quantum version of a Trojan-horse attack, photons are injected into the optical
modules of a quantum key distribution system in an attempt to read information direct from …

Decoy-state quantum key distribution with a leaky source

K Tamaki, M Curty, M Lucamarini - New Journal of Physics, 2016 - iopscience.iop.org
In recent years, there has been a great effort to prove the security of quantum key distribution
(QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this …

Attacks on practical quantum key distribution systems (and how to prevent them)

N Jain, B Stiller, I Khan, D Elser, C Marquardt… - Contemporary …, 2016 - Taylor & Francis
With the emergence of an information society, the idea of protecting sensitive data is steadily
gaining importance. Conventional encryption methods may not be sufficient to guarantee …

Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

K Yoshino, M Fujiwara, K Nakata, T Sumiya… - npj Quantum …, 2018 - nature.com
Quantum key distribution (QKD) allows two distant parties to share secret keys with the
proven security even in the presence of an eavesdropper with unbounded computational …

Round-trip multi-band quantum access network

Y Xu, T Wang, H Zhao, P Huang, G Zeng - Photonics Research, 2023 - opg.optica.org
The quantum network makes use of quantum states to transmit data, which will revolutionize
classical communication and allow for some breakthrough applications. Quantum key …