Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Quantum key distribution with entangled photons generated on demand by a quantum dot
Quantum key distribution—exchanging a random secret key relying on a quantum
mechanical resource—is the core feature of secure quantum networks. Entanglement-based …
mechanical resource—is the core feature of secure quantum networks. Entanglement-based …
Advances in device-independent quantum key distribution
V Zapatero, T van Leent, R Arnon-Friedman… - npj quantum …, 2023 - nature.com
Device-independent quantum key distribution (DI-QKD) provides the gold standard for
secure key exchange. Not only does it allow for information-theoretic security based on …
secure key exchange. Not only does it allow for information-theoretic security based on …
[图书][B] Quantum information processing with finite resources: mathematical foundations
M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …
potential of small quantum information processing devices. As decoherence will continue to …
Quantum random number generation
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …
roles in many applications, especially in cryptography. Genuine randomness from the …
Fully device independent quantum key distribution
U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
Practical device-independent quantum cryptography via entropy accumulation
Device-independent cryptography goes beyond conventional quantum cryptography by
providing security that holds independently of the quality of the underlying physical devices …
providing security that holds independently of the quality of the underlying physical devices …
Detection-loophole-free test of quantum nonlocality, and applications
BG Christensen, KT McCusker, JB Altepeter, B Calkins… - Physical review …, 2013 - APS
We present a source of entangled photons that violates a Bell inequality free of the “fair-
sampling” assumption, by over 7 standard deviations. This violation is the first reported …
sampling” assumption, by over 7 standard deviations. This violation is the first reported …