Zobrazeno 1 - 10
of 114
pro vyhledávání: '"Marcos Curty"'
Autor:
Víctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, Marcos Curty
Publikováno v:
npj Quantum Information, Vol 9, Iss 1, Pp 1-11 (2023)
Abstract Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only does it allow for information-theoretic security based on quantum mechanics, but it also relaxes the need to physically model t
Externí odkaz:
https://doaj.org/article/fb3feb86b79d4977827e9d39845f8bae
Publikováno v:
npj Quantum Information, Vol 7, Iss 1, Pp 1-9 (2021)
Abstract Quantum key distribution (QKD) offers a reliable solution to communication problems that require long-term data security. For its widespread use, however, the rate and reach of QKD systems must be improved. Twin-field (TF) QKD is a step forw
Externí odkaz:
https://doaj.org/article/2865763991f5416abcb120f85a18582b
Autor:
Víctor Zapatero, Marcos Curty
Publikováno v:
npj Quantum Information, Vol 7, Iss 1, Pp 1-8 (2021)
Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice.
Externí odkaz:
https://doaj.org/article/07174a04c1fb47cc888859497bec3adc
Autor:
Margarida Pereira, Guillermo Currás-Lorenzo, Álvaro Navarrete, Akihiro Mizutani, Go Kato, Marcos Curty, Kiyoshi Tamaki
Publikováno v:
Physical Review Research, Vol 5, Iss 2, p 023065 (2023)
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources h
Externí odkaz:
https://doaj.org/article/f685e5a5663543fdb1c2153a0eb39e90
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-11 (2021)
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This in
Externí odkaz:
https://doaj.org/article/72f35afdef8d4656823bfdd5f3802586
Publikováno v:
Quantum, Vol 5, p 602 (2021)
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoy-state QKD systems, however, i
Externí odkaz:
https://doaj.org/article/31e1a79d514b49469fc94e5ce45b7788
Autor:
Róbert Trényi, Marcos Curty
Publikováno v:
New Journal of Physics, Vol 23, Iss 9, p 093005 (2021)
Coherent-one-way (COW) quantum key distribution (QKD) held the promise of distributing secret keys over long distances with a simple experimental setup. Indeed, this scheme is currently used in commercial applications. Surprisingly, however, it has b
Externí odkaz:
https://doaj.org/article/23e615ca0428443ca36f9714fea2ce25
Publikováno v:
Entropy, Vol 17, Iss 6, Pp 4064-4082 (2015)
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission ra
Externí odkaz:
https://doaj.org/article/cbe36ad3764640abb95cc9bc4474b9ad
Autor:
Federico Grasselli, Marcos Curty
Publikováno v:
New Journal of Physics, Vol 21, Iss 7, p 073001 (2019)
Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Inde
Externí odkaz:
https://doaj.org/article/8a0b92b32e904d83a54ec48642fd5ab4
Publikováno v:
New Journal of Physics, Vol 21, Iss 11, p 113032 (2019)
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-distance QKD implementations, since its secret key rate can overcome the repeaterless bound by means of a simple interferometric measurement. Many var
Externí odkaz:
https://doaj.org/article/3f4a60671ca040f282a23e0725ad3867