Micius quantum experiments in space

CY Lu, Y Cao, CZ Peng, JW Pan - Reviews of Modern Physics, 2022 - APS
Quantum theory has been successfully validated in numerous laboratory experiments. But
would such a theory, which effectively describes the behavior of microscopic physical …

Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Experimental quantum key distribution certified by Bell's theorem

DP Nadlinger, P Drmota, BC Nichol, G Araneda… - Nature, 2022 - nature.com
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdropping attacks …

Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference

YM Xie, YS Lu, CX Weng, XY Cao, ZY Jia, Y Bao… - PRX Quantum, 2022 - APS
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless
quantum key distribution via single-photon interference. However, to compensate for the …

Mode-pairing quantum key distribution

P Zeng, H Zhou, W Wu, X Ma - Nature Communications, 2022 - nature.com
Quantum key distribution—the establishment of information-theoretically secure keys based
on quantum physics—is mainly limited by its practical performance, which is characterised …

Quantum dots for photonic quantum information technology

T Heindel, JH Kim, N Gregersen, A Rastelli… - Advances in Optics …, 2023 - opg.optica.org
The generation, manipulation, storage, and detection of single photons play a central role in
emerging photonic quantum information technology. Individual photons serve as flying …

Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Quantum communication using semiconductor quantum dots

DA Vajner, L Rickert, T Gao… - Advanced Quantum …, 2022 - Wiley Online Library
Worldwide, enormous efforts are directed toward the development of the so‐called quantum
internet. Turning this long‐sought‐after dream into reality is a great challenge that will …

Adversarial discriminative domain adaptation

E Tzeng, J Hoffman, K Saenko… - Proceedings of the …, 2017 - openaccess.thecvf.com
Adversarial learning methods are a promising approach to training robust deep networks,
and can generate complex samples across diverse domains. They can also improve …