Zobrazeno 1 - 10
of 229
pro vyhledávání: '"Curty, Marcos"'
The performance of quantum key distribution (QKD) heavily depends on the finite statistics of its security proof. For multiple protocols and proof techniques, the central statistical task is a random sampling problem, which is customarily addressed b
Externí odkaz:
http://arxiv.org/abs/2410.04095
Publikováno v:
Quantum Sci. Technol. 9, 035044 (2024)
Recent results have shown that the secret-key rate of coherent-one-way (COW) quantum key distribution (QKD) scales quadratically with the system's transmittance, thus rendering this protocol unsuitable for long-distance transmission. This was proven
Externí odkaz:
http://arxiv.org/abs/2406.13760
Autor:
Pereira, Margarida, Currás-Lorenzo, Guillermo, Mizutani, Akihiro, Rusca, Davide, Curty, Marcos, Tamaki, Kiyoshi
Publikováno v:
Quantum Sci. Technol. 10 015001 (2024)
A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals. Although recent works have proved the security of QKD in the presence of this imperfection, they rest on the pre
Externí odkaz:
http://arxiv.org/abs/2402.08028
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real-life QKD systems. Here, we provide a succint review on this topic, focusing on discr
Externí odkaz:
http://arxiv.org/abs/2310.20377
Autor:
Zapatero, Víctor, Curty, Marcos
The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems, in so reaching an enhanced simplicity, immunity to modulator side channels, and potentially higher re
Externí odkaz:
http://arxiv.org/abs/2308.02376
Quantum key distribution (QKD) can theoretically achieve the Holy Grail of cryptography, information-theoretic security against eavesdropping. However, in practice, discrepancies between the mathematical models assumed in security proofs and the actu
Externí odkaz:
http://arxiv.org/abs/2305.05930
Autor:
Lu, Feng-Yu, Wang, Ze-Hao, Zapatero, Víctor, Chen, Jia-Lin, Wang, Shuang, Yin, Zhen-Qiang, Curty, Marcos, He, De-Yong, Wang, Rong, Chen, Wei, Fan-Yuan, Guan-Jie, Guo, Guang-Can, Han, Zheng-Fu
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completel
Externí odkaz:
http://arxiv.org/abs/2304.11655
Publikováno v:
EPJ Quantum Technol. 10, 53 (2023)
Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that th
Externí odkaz:
http://arxiv.org/abs/2304.03562
Autor:
Pereira, Margarida, Currás-Lorenzo, Guillermo, Navarrete, Álvaro, Mizutani, Akihiro, Kato, Go, Curty, Marcos, Tamaki, Kiyoshi
Publikováno v:
Phys. Rev. Research 5, 023065 (2023)
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources h
Externí odkaz:
http://arxiv.org/abs/2210.11754
Publikováno v:
Quantum Sci. Technol. 9, 015025 (2024)
The performance of quantum key distribution (QKD) is severely limited by multiphoton emissions, due to the photon-number-splitting attack. The most efficient solution, the decoy-state method, requires that the phases of all transmitted pulses are ind
Externí odkaz:
http://arxiv.org/abs/2210.08183