Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Quantum key distribution with entangled photons generated on demand by a quantum dot

F Basso Basset, M Valeri, E Roccia, V Muredda… - Science …, 2021 - science.org
Quantum key distribution—exchanging a random secret key relying on a quantum
mechanical resource—is the core feature of secure quantum networks. Entanglement-based …

Advances in device-independent quantum key distribution

V Zapatero, T van Leent, R Arnon-Friedman… - npj quantum …, 2023 - nature.com
Device-independent quantum key distribution (DI-QKD) provides the gold standard for
secure key exchange. Not only does it allow for information-theoretic security based on …

[图书][B] Quantum information processing with finite resources: mathematical foundations

M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …

Quantum random number generation

X Ma, X Yuan, Z Cao, B Qi, Z Zhang - npj Quantum Information, 2016 - nature.com
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …

Fully device independent quantum key distribution

U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …

Practical device-independent quantum cryptography via entropy accumulation

R Arnon-Friedman, F Dupuis, O Fawzi… - Nature …, 2018 - nature.com
Device-independent cryptography goes beyond conventional quantum cryptography by
providing security that holds independently of the quality of the underlying physical devices …

Detection-loophole-free test of quantum nonlocality, and applications

BG Christensen, KT McCusker, JB Altepeter, B Calkins… - Physical review …, 2013 - APS
We present a source of entangled photons that violates a Bell inequality free of the “fair-
sampling” assumption, by over 7 standard deviations. This violation is the first reported …