Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
Practical challenges in quantum key distribution
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
Measurement-device-independent quantum key distribution over untrustful metropolitan network
Quantum cryptography holds the promise to establish an information-theoretically secure
global network. All field tests of metropolitan-scale quantum networks to date are based on …
global network. All field tests of metropolitan-scale quantum networks to date are based on …
Homodyne-detector-blinding attack in continuous-variable quantum key distribution
We propose an efficient strategy to attack a continuous-variable (CV) quantum key
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …
Detecting quantum attacks: A machine learning based defense strategy for practical continuous-variable quantum key distribution
Y Mao, W Huang, H Zhong, Y Wang, H Qin… - New Journal of …, 2020 - iopscience.iop.org
The practical security of a continuous-variable quantum key distribution (CVQKD) system is
compromised by various attack strategies. The existing countermeasures against these …
compromised by various attack strategies. The existing countermeasures against these …
Hybrid quantum key distribution network
S Ren, Y Wang, X Su - Science China Information Sciences, 2022 - Springer
Quantum key distribution (QKD) is now moving toward a scalable and secure QKD network,
which establishes secret keys among network users. The continuous-variable (CV) and …
which establishes secret keys among network users. The continuous-variable (CV) and …
Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration
Reference-frame-independent measurement-device-independent quantum key distribution
(RFI-MDI-QKD) can reduce the complexity of practical systems caused by the alignment of …
(RFI-MDI-QKD) can reduce the complexity of practical systems caused by the alignment of …
Quantum random number generator using a cloud superconducting quantum computer based on source-independent protocol
Y Li, Y Fei, W Wang, X Meng, H Wang, Q Duan… - Scientific Reports, 2021 - nature.com
Quantum random number generator (QRNG) relies on the intrinsic randomness of quantum
mechanics to produce true random numbers which are important in information processing …
mechanics to produce true random numbers which are important in information processing …
Satellite-to-submarine quantum communication based on measurement-device-independent continuous-variable quantum key distribution
In satellite-to-submarine quantum communication, sea surface, which may cause refraction
and propagation light deflection, is a non-negligible obstacle. These negative effects can …
and propagation light deflection, is a non-negligible obstacle. These negative effects can …