Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …
quantum key distribution via single-photon interference. However, to compensate for the …
Photonic quantum information processing: a review
Photonic quantum technologies represent a promising platform for several applications,
ranging from long-distance communications to the simulation of complex phenomena …
ranging from long-distance communications to the simulation of complex phenomena …
Experimental quantum secure network with digital signatures and encryption
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
Experimental quantum e-commerce
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
Quantum-secured blockchain
Blockchain is a distributed database which is cryptographically protected against malicious
modifications. While promising for a wide range of applications, current blockchain platforms …
modifications. While promising for a wide range of applications, current blockchain platforms …
Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all
detector side channels and it is practical with current technology. Previous implementations …
detector side channels and it is practical with current technology. Previous implementations …
One-time universal hashing quantum digital signatures without perfect keys
Quantum digital signatures (QDSs), generating correlated bit strings among three remote
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …
Advantages of asynchronous measurement-device-independent quantum key distribution in intercity networks
The alternative variant of measurement-device-independent quantum key distribution (MDI
QKD), called asynchronous MDI QKD or mode-pairing MDI QKD, offers similar repeaterlike …
QKD), called asynchronous MDI QKD or mode-pairing MDI QKD, offers similar repeaterlike …