Quantum computing: A taxonomy, systematic review and future directions
Quantum computing (QC) is an emerging paradigm with the potential to offer significant
computational advantage over conventional classical computing by exploiting quantum …
computational advantage over conventional classical computing by exploiting quantum …
Advances in chip-based quantum key distribution
Quantum key distribution (QKD), guaranteed by the principles of quantum mechanics, is one
of the most promising solutions for the future of secure communication. Integrated quantum …
of the most promising solutions for the future of secure communication. Integrated quantum …
Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions
The postselection technique is an important proof technique for proving the security of
quantum key distribution protocols against coherent attacks via the uplift of any security …
quantum key distribution protocols against coherent attacks via the uplift of any security …
Model for optimizing quantum key distribution with continuous-wave pumped entangled-photon sources
Quantum key distribution (QKD) allows unconditionally secure communication based on the
laws of quantum mechanics rather than assumptions about computational hardness …
laws of quantum mechanics rather than assumptions about computational hardness …
Dimension reduction in quantum key distribution for continuous-and discrete-variable protocols
We develop a method to connect the infinite-dimensional description of optical continuous-
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The …
Numerical calculations of the finite key rate for general quantum key distribution protocols
Finite key analysis of quantum key distribution (QKD) is an important tool for any QKD
implementation. While much work has been done on the framework of finite key analysis, the …
implementation. While much work has been done on the framework of finite key analysis, the …
Security of differential phase shift QKD from relativistic principles
M Sandfuchs, M Haberland, V Vilasini, R Wolf - Quantum, 2025 - quantum-journal.org
The design of quantum protocols for secure key generation poses many challenges: On the
one hand, they need to be practical concerning experimental realisations. On the other …
one hand, they need to be practical concerning experimental realisations. On the other …
A simple low-latency real-time certifiable quantum random number generator
Quantum random numbers distinguish themselves from others by their intrinsic
unpredictability arising from the principles of quantum mechanics. As such they are …
unpredictability arising from the principles of quantum mechanics. As such they are …
Trusted detector noise analysis for discrete modulation schemes of continuous-variable quantum key distribution
J Lin, N Lütkenhaus - Physical Review Applied, 2020 - APS
Discrete-modulated continuous-variable quantum key distribution protocols are promising
candidates for large-scale deployment due to the large technological overlap with deployed …
candidates for large-scale deployment due to the large technological overlap with deployed …
Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation
G Chen, Y Wang, L Jian, Y Zhou, S Liu, J Luo… - Journal of Applied …, 2023 - pubs.aip.org
Quantum identity authentication (QIA) ensures that entities of quantum communication will
not be impersonated by attackers. As an auxiliary protocol, an ideal QIA protocol cannot take …
not be impersonated by attackers. As an auxiliary protocol, an ideal QIA protocol cannot take …