Covert information sharing via ghost displacement

U Zanforlin, G Tatsi, J Jeffers, GS Buller - Physical Review A, 2023 - APS
Ghost imaging research has demonstrated that it is possible to reproduce an image of an
object that has not interacted with the imaging light. In this paper we describe theoretically …

[HTML][HTML] Subcarrier wave continuous-variable quantum key distribution with Gaussian modulation: composable security analysis

RK Goncharov, AD Kiselev, EO Samsonov… - Компьютерная …, 2023 - cyberleninka.ru
In this paper, we continue the study of the quantum cryptographic GG02 protocol, performed
using the approach based on the subcarrier waves. We modify the scheme via heterodyne …

Учредители: Государственный оптический институт им. СИ Вавилова, Национальный исследовательский университет ИТМО, Международная …

АВ ЛУКИН, АН МЕЛЬНИКОВ, АФ СКОЧИЛОВ - Оптический журнал, 2022 - elibrary.ru
Предмет исследования. Обсуждаются наработки и предлагаемые новации в научно-
производственном объединении «Государственный институт прикладной оптики» в …

[HTML][HTML] Overview of device-independent continuous-variable quantum key distribution

R Goncharov, E Bolychev, I Vorontsova… - Наносистемы …, 2022 - cyberleninka.ru
The objects of study of this paper are quantum key distribution (QKD) protocols and systems,
in particular, continuous variable (CV) ones with untrusted devices (measurement devices or …

Security of plug-and-play continuous-variable quantum key distribution

RK Goncharov, DN Kirichenko… - Journal of Optical …, 2022 - opg.optica.org
Subject of study. Two-way continuous-variable quantum key distribution schemes are
studied. Aim. This study aims to prove the security of the plug-and-play continuous-variable …