Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Quantum internet: A vision for the road ahead
BACKGROUND The internet has had a revolutionary impact on our world. The vision of a
quantum internet is to provide fundamentally new internet technology by enabling quantum …
quantum internet is to provide fundamentally new internet technology by enabling quantum …
Adversarial discriminative domain adaptation
Adversarial learning methods are a promising approach to training robust deep networks,
and can generate complex samples across diverse domains. They can also improve …
and can generate complex samples across diverse domains. They can also improve …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
A device-independent quantum key distribution system for distant users
W Zhang, T van Leent, K Redeker, R Garthoff… - Nature, 2022 - nature.com
Device-independent quantum key distribution (DIQKD) enables the generation of secret
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
Gaussian quantum information
The science of quantum information has arisen over the last two decades centered on the
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
Experimental demonstration of memory-enhanced quantum communication
The ability to communicate quantum information over long distances is of central importance
in quantum science and engineering. Although some applications of quantum …
in quantum science and engineering. Although some applications of quantum …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …
as the hardness of prime factorization to provide security against eavesdrop** attacks …
Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …
quantum key distribution via single-photon interference. However, to compensate for the …
[HTML][HTML] Fundamental limits of repeaterless quantum communications
Quantum communications promises reliable transmission of quantum information, efficient
distribution of entanglement and generation of completely secure keys. For all these tasks …
distribution of entanglement and generation of completely secure keys. For all these tasks …