[HTML][HTML] Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

J Gu, XY Cao, Y Fu, ZW He, ZJ Yin, HL Yin, ZB Chen - Science Bulletin, 2022 - Elsevier
The security of quantum key distribution (QKD) is severely threatened by discrepancies
between realistic devices and theoretical assumptions. Recently, a significant framework …

Experimental demonstration of fully passive quantum key distribution

FY Lu, ZH Wang, V Zapatero, JL Chen, S Wang… - Physical Review Letters, 2023 - APS
The passive approach to quantum key distribution (QKD) consists of removing all active
modulation from the users' devices, a highly desirable countermeasure to get rid of …

Hacking measurement-device-independent quantum key distribution

FY Lu, P Ye, ZH Wang, S Wang, ZQ Yin, R Wang… - Optica, 2023 - opg.optica.org
Decoy-state measurement-device-independent quantum key distribution (MDI-QKD) is
regarded as one of the most promising protocols since it is physically immune to all fatal …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …

Modified BB84 quantum key distribution protocol robust to source imperfections

M Pereira, G Currás-Lorenzo, Á Navarrete… - Physical Review …, 2023 - APS
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …

Security of decoy-state quantum key distribution with correlated intensity fluctuations

X Sixto, V Zapatero, M Curty - Physical Review Applied, 2022 - APS
One of the most prominent techniques to enhance the performance of practical quantum key
distribution (QKD) systems with laser sources is the decoy-state method. Current decoy-state …

Preparing a commercial quantum key distribution system for certification against implementation loopholes

V Makarov, A Abrikosov, P Chaiwongkhot… - Physical Review …, 2024 - APS
A commercial quantum key distribution (QKD) system needs to be formally certified to
enable its wide deployment. The certification should include the system's robustness against …

Finite-key security of passive quantum key distribution

V Zapatero, M Curty - Physical Review Applied, 2024 - APS
The passive approach to quantum key distribution (QKD) eliminates all optical modulators
and random number generators from QKD systems reaching an enhanced simplicity …

Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks

Á Navarrete, M Curty - Quantum Science and Technology, 2022 - iopscience.iop.org
Most security proofs of quantum key distribution (QKD) disregard the effect of information
leakage from the users' devices, and, thus, do not protect against Trojan-horse attacks …

Imperfect phase randomization and generalized decoy-state quantum key distribution

S Nahar, T Upadhyaya, N Lütkenhaus - Physical Review Applied, 2023 - APS
Decoy-state methods are essential to perform quantum key distribution (QKD) at large
distances in the absence of single-photon sources. However, the standard techniques apply …