Mizutani et al., 2019 - Google Patents
Quantum key distribution with setting-choice-independently correlated light sourcesMizutani et al., 2019
View HTML- Document ID
- 10928889567343364785
- Author
- Mizutani A
- Kato G
- Azuma K
- Curty M
- Ikuta R
- Yamamoto T
- Imoto N
- Lo H
- Tamaki K
- Publication year
- Publication venue
- npj Quantum Information
External Links
Snippet
Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing practical QKD systems is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal …
- 238000009826 distribution 0 title abstract description 45
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mizutani et al. | Quantum key distribution with setting-choice-independently correlated light sources | |
Curty et al. | Finite-key analysis for measurement-device-independent quantum key distribution | |
Matsuura et al. | Finite-size security of continuous-variable quantum key distribution with digital signal processing | |
Pittaluga et al. | 600-km repeater-like quantum communications with dual-band stabilization | |
Schwonnek et al. | Device-independent quantum key distribution with random key basis | |
Zeng et al. | Mode-pairing quantum key distribution | |
Pan et al. | Experimental free-space quantum secure direct communication and its security analysis | |
Arnon-Friedman et al. | Practical device-independent quantum cryptography via entropy accumulation | |
Maeda et al. | Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit | |
Carvacho et al. | Experimental violation of local causality in a quantum network | |
Currás-Lorenzo et al. | Tight finite-key security for twin-field quantum key distribution | |
Masanes et al. | Secure device-independent quantum key distribution with causally independent measurement devices | |
Wang et al. | Characterising the correlations of prepare-and-measure quantum networks | |
Yin et al. | Tight security bounds for decoy-state quantum key distribution | |
Wang et al. | Optimized protocol for twin-field quantum key distribution | |
Yin et al. | Finite-key analysis for twin-field quantum key distribution with composable security | |
Pappa et al. | Experimental plug and play quantum coin flipping | |
Zhong et al. | Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses | |
Liang et al. | Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding | |
Wang et al. | Measurement-device-independent quantum key distribution with leaky sources | |
Bunandar et al. | Numerical finite-key analysis of quantum key distribution | |
Morrison et al. | Single-emitter quantum key distribution over 175 km of fibre with optimised finite key rates | |
Mao et al. | Plug-and-play round-robin differential phase-shift quantum key distribution | |
Kumar et al. | Experimental demonstration of quantum advantage for one-way communication complexity surpassing best-known classical protocol | |
Liu et al. | Round-robin differential-phase-shift quantum key distribution with a passive decoy state method |