The evolution of quantum key distribution networks: On the road to the qinternet

Y Cao, Y Zhao, Q Wang, J Zhang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …

Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Practical challenges in quantum key distribution

E Diamanti, HK Lo, B Qi, Z Yuan - npj Quantum Information, 2016 - nature.com
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …

Long-distance continuous-variable quantum key distribution by controlling excess noise

D Huang, P Huang, D Lin, G Zeng - Scientific reports, 2016 - nature.com
Quantum cryptography founded on the laws of physics could revolutionize the way in which
communication information is protected. Significant progresses in long-distance quantum …

Reliable numerical key rates for quantum key distribution

A Winick, N Lütkenhaus, PJ Coles - Quantum, 2018 - quantum-journal.org
In this work, we present a reliable, efficient, and tight numerical method for calculating key
rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our …

Practical security bounds against the trojan-horse attack in quantum key distribution

M Lucamarini, I Choi, MB Ward, JF Dynes, ZL Yuan… - Physical Review X, 2015 - APS
In the quantum version of a Trojan-horse attack, photons are injected into the optical
modules of a quantum key distribution system in an attempt to read information direct from …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …

Enabling secure and trustworthy quantum networks: current state-of-the-art, key challenges, and potential solutions

S Bajrić - IEEE Access, 2023 - ieeexplore.ieee.org
Quantum networks hold the promise of enabling secure and trustworthy communication and
computation. However, they also pose significant challenges in terms of security, privacy …

Attacks on practical quantum key distribution systems (and how to prevent them)

N Jain, B Stiller, I Khan, D Elser, C Marquardt… - Contemporary …, 2016 - Taylor & Francis
With the emergence of an information society, the idea of protecting sensitive data is steadily
gaining importance. Conventional encryption methods may not be sufficient to guarantee …