Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Reference frames, superselection rules, and quantum information

SD Bartlett, T Rudolph, RW Spekkens - Reviews of Modern Physics, 2007 - APS
Recently, there has been much interest in a new kind of “unspeakable” quantum information
that stands to regular quantum information in the same way that a direction in space or a …

Secure quantum key distribution over 421 km of optical fiber

A Boaron, G Boso, D Rusca, C Vulliez, C Autebert… - Physical review …, 2018 - APS
We present a quantum key distribution system with a 2.5 GHz repetition rate using a three-
state time-bin protocol combined with a one-decoy approach. Taking advantage of …

Loss-tolerant quantum cryptography with imperfect sources

K Tamaki, M Curty, G Kato, HK Lo, K Azuma - Physical Review A, 2014 - APS
In principle, quantum key distribution (QKD) offers unconditional security based on the laws
of physics. Unfortunately, all previous QKD experiments assume perfect state preparation in …

Practical issues in quantum-key-distribution postprocessing

CHF Fung, X Ma, HF Chau - Physical Review A—Atomic, Molecular, and …, 2010 - APS
Quantum key distribution (QKD) is a secure key generation method between two distant
parties by wisely exploiting properties of quantum mechanics. In QKD, experimental …

Security of quantum key distribution from generalised entropy accumulation

T Metger, R Renner - Nature Communications, 2023 - nature.com
The goal of quantum key distribution (QKD) is to establish a secure key between two parties
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …

Semiquantum-key distribution using less than four quantum states

X Zou, D Qiu, L Li, L Wu, L Li - Physical Review A—Atomic, Molecular, and …, 2009 - APS
Recently Boyer [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key
distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key …

Quantum key distribution with correlated sources

M Pereira, G Kato, A Mizutani, M Curty, K Tamaki - Science Advances, 2020 - science.org
In theory, quantum key distribution (QKD) offers information-theoretic security. In practice,
however, it does not due to the discrepancies between the assumptions used in the security …

Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound

K Tamaki, HK Lo, W Wang, M Lucamarini - arXiv preprint arXiv …, 2018 - arxiv.org
Quantum key distribution is a way to distribute secret keys to distant users with information
theoretic security and key rates suitable for real-world applications. Its rate-distance figure …

Security proof of quantum key distribution with detection efficiency mismatch

CF Fung, K Tamaki, B Qi, HK Lo, X Ma - arXiv preprint arXiv:0802.3788, 2008 - arxiv.org
In theory, quantum key distribution (QKD) offers unconditional security based on the laws of
physics. However, as demonstrated in recent quantum hacking theory and experimental …