The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Experimental satellite quantum communications

G Vallone, D Bacco, D Dequal, S Gaiarin, V Luceri… - Physical Review Letters, 2015 - APS
Quantum communication (QC), namely, the faithful transmission of generic quantum states,
is a key ingredient of quantum information science. Here we demonstrate QC with …

Experimental single-photon exchange along a space link of 7000 km

D Dequal, G Vallone, D Bacco, S Gaiarin, V Luceri… - Physical Review A, 2016 - APS
Extending the single-photon transmission distance is a basic requirement for the
implementation of quantum communication on a global scale. In this work we report the …

Machine learning for optimal parameter prediction in quantum key distribution

W Wang, HK Lo - Physical Review A, 2019 - APS
For a practical quantum key distribution (QKD) system, parameter optimization, the choice of
intensities and the probabilities of sending them, is a crucial step in gaining optimal …

Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

M Hayashi, R Nakayama - New Journal of Physics, 2014 - iopscience.iop.org
This paper provides a formula for the sacrifice bit-length for privacy amplification with the
Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method …

Induced effects of the Dzyaloshinskii-Moriya interaction on the thermal entanglement in spin-1/2 Heisenberg chains

E Mehran, S Mahdavifar, R Jafari - Physical Review A, 2014 - APS
The nearest-neighbor spins in the one-dimensional spin-1/2 XX model with the added
Dzyaloshinskii-Moriya (DM) interaction are entangled at zero temperature. In the presence …

Finite-block-length analysis in classical and quantum information theory

M Hayashi - Proceedings of the Japan Academy, Series B, 2017 - jstage.jst.go.jp
Coding technology is used in several information processing tasks. In particular, when noise
during transmission disturbs communications, coding technology is employed to protect the …

Machine learning with neural networks for parameter optimization in twin-field quantum key distribution

JL Kang, MH Zhang, XP Liu, JH Xie - Quantum Information Processing, 2023 - Springer
Twin-field quantum key distribution (TF-QKD) has the advantage of beating the rate-loss limit
(PLOB bound) for a repeaterless quantum key distribution (QKD) system. In practice …

Detector decoy quantum key distribution

T Moroder, M Curty, N Lütkenhaus - New Journal of Physics, 2009 - iopscience.iop.org
Photon number resolving detectors can enhance the performance of many practical
quantum cryptographic setups. In this paper, we employ a simple method to estimate the …

Discrete variable (dv) qkd

IB Djordjevic, IB Djordjevic - Physical-layer security and quantum key …, 2019 - Springer
This chapter is devoted to the discrete variable (DV) QKD protocols and represents the
continuation of Chap. 6. The chapter starts with the description of BB84 and decoy-state …