Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Overcoming the rate–distance limit of quantum key distribution without quantum repeaters

M Lucamarini, ZL Yuan, JF Dynes, AJ Shields - Nature, 2018 - nature.com
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …

A trusted node–free eight-user metropolitan quantum communication network

SK Joshi, D Aktas, S Wengerowsky, M Lončarić… - Science …, 2020 - science.org
Quantum communication is rapidly gaining popularity due to its high security and
technological maturity. However, most implementations are limited to just two …

Continuous entanglement distribution over a transnational 248 km fiber link

SP Neumann, A Buchner, L Bulla, M Bohmann… - Nature …, 2022 - nature.com
Reliable long-distance distribution of entanglement is a key technique for many quantum
applications, most notably quantum key distribution. Here, we present a continuously …

Experimental measurement-device-independent quantum key distribution

Y Liu, TY Chen, LJ Wang, H Liang, GL Shentu, J Wang… - Physical review …, 2013 - APS
Quantum key distribution is proven to offer unconditional security in communication between
two remote users with ideal source and detection. Unfortunately, ideal devices never exist in …

Efficient decoy-state quantum key distribution with quantified security

M Lucamarini, KA Patel, JF Dynes, B Fröhlich… - Optics express, 2013 - opg.optica.org
We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol
implemented with decoy states and apply the results to a gigahertz-clocked quantum key …

Alternative schemes for measurement-device-independent quantum key distribution

X Ma, M Razavi - Physical Review A—Atomic, Molecular, and Optical …, 2012 - APS
Practical schemes for measurement-device-independent quantum key distribution using
phase and path or time encoding are presented. In addition to immunity to existing …

Statistical fluctuation analysis for measurement-device-independent quantum key distribution

X Ma, CHF Fung, M Razavi - Physical Review A—Atomic, Molecular, and …, 2012 - APS
Measurement-device-independent quantum key distribution with a finite number of decoy
states is analyzed under finite-data-size assumption. By accounting for statistical fluctuations …

A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks

A Lohachab, A Lohachab, A Jangra - Internet of Things, 2020 - Elsevier
Abstract Internet of Things (IoT) ideates smart and inter-connected things capable of sharing
their perceptions through the Internet. These devices are different from conventional Internet …