Search
Search Results
-
Composable end-to-end security of Gaussian quantum networks with untrusted relays
Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated...
-
Quantum Key Distribution with Untrusted Detectors Accessible to an Eavesdropper
A simple fundamental modification of quantum key distribution protocols has been proposed: it is not required to protect the results of avalanche...
-
Entanglement-based quantum key distribution with untrusted third party
In quantum key distribution, it is important to ensure the secure key rate and the distribution distance. To increasing transmission distance, we...
-
Enhancing quantum cryptography with quantum dot single-photon sources
Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means....
-
Improve the performance of reference-frame-independent measurement-device-independent quantum key distribution with heralded single-photon sources
The performance degradation of reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) protocol caused by...
-
Star network quantum steering
The topic of network steering in the independent-resource line network with intermediate parties being trusted and end parties being untrusted is...
-
Unbounded randomness from uncharacterized sources
Randomness is a central feature of quantum mechanics and an invaluable resource for both classical and quantum technologies. Commonly, in...
-
Practical anonymous entanglement with noisy measurement
Anonymous entanglement refers to the construction of entangled channel between two parties among the quantum network, while kee** the identities of...
-
Semi-device-independent quantum random number generator with a broadband squeezed state of light
Random numbers are a basic ingredient of simulation algorithms and cryptography, and play a significant part in computer simulation and information...
-
Qubit and bit-based quantum hybrid secret key generation
For the generation of a hybrid secret key, hardly any quantum algorithms integrating computed qubits and decrypted bits have yet been developed....
-
Security analysis and improvement of source independent quantum random number generators with imperfect devices
A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and...
-
Plug-and-play sending-or-not-sending twin-field quantum key distribution
Twin-field quantum key distribution (TF-QKD) is a new extraordinary QKD protocol, which can overcome the fundamental rate-distance limit without...
-
Quantum Key Distribution in Access Networks
This chapter presents a literature survey of data security in optical fiber networks. The evolution of data security in optical fibers starts from... -
Detecting and embedding high-dimensional genuine multipartite entanglement states
Entanglement of high-dimensional multipartite systems plays an important role both in quantum foundation and applications of quantum physics....
-
Measurement-device-independent quantum key distribution with uncharacterized coherent sources
Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close all possible side channel detector attacks. The security of...
-
Experimental demonstration of multiparty quantum secret sharing and conference key agreement
Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryption approaches for realizing multi-party secure...
-
A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks
Classical encryption protocols that are currently used to secure the internet and transmission control protocol/internet protocol (TCP/IP) protocols...
-
Breaking universal limitations on quantum conference key agreement without quantum memory
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires...
-
Revealing hidden steering nonlocality in a quantum network
AbstractBy combining two objects with no quantum effect one can get an object with quantum effect. Such a phenomenon, often referred to as activation ...
-
Applications of single photons to quantum communication and computing
In the context of quantum technologies, the generation and manipulation of single photons has become a key element for applications such as quantum...