Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum repeaters: From quantum networks to the quantum internet
A quantum internet is the holy grail of quantum information processing, enabling the
deployment of a broad range of quantum technologies and protocols on a global scale …
deployment of a broad range of quantum technologies and protocols on a global scale …
Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Experimental twin-field quantum key distribution over 1000 km fiber distance
Quantum key distribution (QKD) aims to generate secure private keys shared by two remote
parties. With its security being protected by principles of quantum mechanics, some …
parties. With its security being protected by principles of quantum mechanics, some …
Experimental quantum communication overcomes the rate-loss limit without global phase tracking
Secure key rate (SKR) of point-point quantum key distribution (QKD) is fundamentally
bounded by the rate-loss limit. Recent breakthrough of twin-field (TF) QKD can overcome …
bounded by the rate-loss limit. Recent breakthrough of twin-field (TF) QKD can overcome …
Mode-pairing quantum key distribution
Quantum key distribution—the establishment of information-theoretically secure keys based
on quantum physics—is mainly limited by its practical performance, which is characterised …
on quantum physics—is mainly limited by its practical performance, which is characterised …
Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …
quantum key distribution via single-photon interference. However, to compensate for the …
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Experimental quantum secure network with digital signatures and encryption
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
Sending-or-not-sending with independent lasers: Secure twin-field quantum key distribution over 509 km
Twin-field (TF) quantum key distribution (QKD) promises high key rates over long distances
to beat the rate-distance limit. Here, applying the sending-or-not-sending TF QKD protocol …
to beat the rate-distance limit. Here, applying the sending-or-not-sending TF QKD protocol …
Robust and adaptable quantum key distribution network without trusted nodes
Quantum key distribution (QKD) networks are promising to serve large numbers of users
with information-theoretic secure communication. In QKD networks, the detection-safe …
with information-theoretic secure communication. In QKD networks, the detection-safe …