Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Gaussian quantum information
The science of quantum information has arisen over the last two decades centered on the
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
Device-independent quantum secure direct communication against collective attacks
Abstract “Device-independent” not only represents a relaxation of the security assumptions
about the internal working of the quantum devices, but also can enhance the security of the …
about the internal working of the quantum devices, but also can enhance the security of the …
Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions
The advanced notebooks, mobile phones, and Internet applications in today's world that we
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …
Single-nanowire electrically driven lasers
Electrically driven semiconductor lasers are used in technologies ranging from
telecommunications and information storage to medical diagnostics and therapeutics. The …
telecommunications and information storage to medical diagnostics and therapeutics. The …
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored,,,,,,,,,,,, as an alternative means to
implement quantum key distribution, which is usually based on single photon counting. The …
implement quantum key distribution, which is usually based on single photon counting. The …
Secure continuous variable teleportation and Einstein-Podolsky-Rosen steering
We investigate the resources needed for secure teleportation of coherent states. We extend
continuous variable teleportation to include quantum teleamplification protocols that allow …
continuous variable teleportation to include quantum teleamplification protocols that allow …
Satellite-based continuous-variable quantum communications: State-of-the-art and a predictive outlook
The recent launch of the Micius quantum-enabled satellite heralds a major step forward for
long-range quantum communication. Using single-photon discrete-variable quantum states …
long-range quantum communication. Using single-photon discrete-variable quantum states …
Non-Gaussian statistics from individual pulses of squeezed light
J Wenger, R Tualle-Brouri, P Grangier - Physical review letters, 2004 - APS
We describe the observation of a “degaussification” protocol that maps individual pulses of
squeezed light onto non-Gaussian states. This effect is obtained by sending a small fraction …
squeezed light onto non-Gaussian states. This effect is obtained by sending a small fraction …
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo - IEEE Transactions on Information Theory, 2003 - ieeexplore.ieee.org
Shor and Preskill (see Phys. Rev. Lett., vol. 85, p. 441, 2000) have provided a simple proof
of security of the standard quantum key distribution scheme by Bennett and Brassard (1984) …
of security of the standard quantum key distribution scheme by Bennett and Brassard (1984) …