Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Quantum internet: A vision for the road ahead

S Wehner, D Elkouss, R Hanson - Science, 2018 - science.org
BACKGROUND The internet has had a revolutionary impact on our world. The vision of a
quantum internet is to provide fundamentally new internet technology by enabling quantum …

Adversarial discriminative domain adaptation

E Tzeng, J Hoffman, K Saenko… - Proceedings of the …, 2017 - openaccess.thecvf.com
Adversarial learning methods are a promising approach to training robust deep networks,
and can generate complex samples across diverse domains. They can also improve …

Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

A device-independent quantum key distribution system for distant users

W Zhang, T van Leent, K Redeker, R Garthoff… - Nature, 2022 - nature.com
Device-independent quantum key distribution (DIQKD) enables the generation of secret
keys over an untrusted channel using uncharacterized and potentially untrusted devices …

Gaussian quantum information

C Weedbrook, S Pirandola, R García-Patrón… - Reviews of Modern …, 2012 - APS
The science of quantum information has arisen over the last two decades centered on the
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …

Experimental demonstration of memory-enhanced quantum communication

MK Bhaskar, R Riedinger, B Machielse, DS Levonian… - Nature, 2020 - nature.com
The ability to communicate quantum information over long distances is of central importance
in quantum science and engineering. Although some applications of quantum …

Experimental quantum key distribution certified by Bell's theorem

DP Nadlinger, P Drmota, BC Nichol, G Araneda… - Nature, 2022 - nature.com
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …

Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference

YM **e, YS Lu, CX Weng, XY Cao, ZY Jia, Y Bao… - PRX Quantum, 2022 - APS
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …

[HTML][HTML] Fundamental limits of repeaterless quantum communications

S Pirandola, R Laurenza, C Ottaviani… - Nature communications, 2017 - nature.com
Quantum communications promises reliable transmission of quantum information, efficient
distribution of entanglement and generation of completely secure keys. For all these tasks …