Security of device-independent quantum key distribution protocols: a review

IW Primaatmaja, KT Goh, EYZ Tan, JTF Khoo… - Quantum, 2023 - quantum-journal.org
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …

[HTML][HTML] Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

J Gu, XY Cao, Y Fu, ZW He, ZJ Yin, HL Yin, ZB Chen - Science Bulletin, 2022 - Elsevier
The security of quantum key distribution (QKD) is severely threatened by discrepancies
between realistic devices and theoretical assumptions. Recently, a significant framework …

Experimental quantum e-commerce

XY Cao, BH Li, Y Wang, Y Fu, HL Yin, ZB Chen - Science Advances, 2024 - science.org
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …

Experimental demonstration of fully passive quantum key distribution

FY Lu, ZH Wang, V Zapatero, JL Chen, S Wang… - Physical Review Letters, 2023 - APS
The passive approach to quantum key distribution (QKD) consists of removing all active
modulation from the users' devices, a highly desirable countermeasure to get rid of …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …

Modified BB84 quantum key distribution protocol robust to source imperfections

M Pereira, G Currás-Lorenzo, Á Navarrete… - Physical Review …, 2023 - APS
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …

Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks

Á Navarrete, M Curty - Quantum Science and Technology, 2022 - iopscience.iop.org
Most security proofs of quantum key distribution (QKD) disregard the effect of information
leakage from the users' devices, and, thus, do not protect against Trojan-horse attacks …

Imperfect phase randomization and generalized decoy-state quantum key distribution

S Nahar, T Upadhyaya, N Lütkenhaus - Physical Review Applied, 2023 - APS
Decoy-state methods are essential to perform quantum key distribution (QKD) at large
distances in the absence of single-photon sources. However, the standard techniques apply …

Characterization of state-preparation uncertainty in quantum key distribution

A Huang, A Mizutani, HK Lo, V Makarov, K Tamaki - Physical Review Applied, 2023 - APS
To achieve secure quantum key distribution, all imperfections in the source unit must be
incorporated in a security proof and measured in the lab. Here we perform a proof-of …

Improved finite-key security analysis of measurement-device-independent quantum key distribution against a trojan-horse attack

HJ Ding, JY Liu, XY Zhou, CH Zhang, J Li, Q Wang - Physical Review Applied, 2023 - APS
Measurement-device-independent quantum key distribution (MDI QKD) is a promising
method for remote key sharing that can eliminate all detector side-channel attacks. However …