Secure quantum key distribution with realistic devices

Some years ago quantum hacking became popular: devices implementing the unbreakable quantum cryptography were shown to have imperfections which could be exploited by attackers. Security has been thoroughly enhanced, as a consequence of both theoretical and experimental advances. This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.

[1]  G. S. Vernam,et al.  Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Physical Review , 1965, Nature.

[4]  P. Pearle Hidden-Variable Example Based upon Data Rejection , 1970 .

[5]  A. Aspect Proposed experiment to test separable hidden-variable theories , 1975 .

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[8]  D. Dieks Communication by EPR devices , 1982 .

[9]  Hong,et al.  Measurement of subpicosecond time intervals between two photons by interference. , 1987, Physical review letters.

[10]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[11]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[12]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[13]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[14]  J. Rarity,et al.  Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel , 1993 .

[15]  Eberhard,et al.  Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[16]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[17]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[18]  James D. Franson,et al.  Operational system for quantum cryptography , 1995 .

[19]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[20]  Radford M. Neal,et al.  Near Shannon Limit Performance of Low Density Parity Check Codes , 1996 .

[21]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[22]  Shor,et al.  Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[23]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[24]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[25]  Charles H. Bennett,et al.  Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[26]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.

[27]  Steane,et al.  Simple quantum error-correcting codes. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[28]  N. Gisin,et al.  Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .

[29]  H. F. Chau,et al.  Why quantum bit commitment and ideal quantum coin tossing are impossible , 1997 .

[30]  P. Townsend Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing , 1997 .

[31]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[32]  C. M. Simmons,et al.  Practical free-space quantum key distribution over 1 km , 1998 .

[33]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[34]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[35]  Nicolas Gisin,et al.  Fast and user-friendly quantum key distribution , 2000 .

[36]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[37]  Norbert Lütkenhaus,et al.  ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .

[38]  David J. C. MacKay,et al.  Comparison of constructions of irregular Gallager codes , 1999, IEEE Trans. Commun..

[39]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[40]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[41]  Hideki Imai,et al.  Reduced complexity iterative decoding of low-density parity check codes based on belief propagation , 1999, IEEE Trans. Commun..

[42]  Richard J. Hughes,et al.  Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.

[43]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[44]  Ueli Maurer,et al.  Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.

[45]  P. Kok,et al.  Postselected versus nonpostselected quantum teleportation using parametric down-conversion , 1999, quant-ph/9903074.

[46]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[47]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[48]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[49]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[50]  M. Reid Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations , 1999, quant-ph/9909030.

[51]  Miloslav Dusek,et al.  Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .

[52]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[53]  H. Weinfurter,et al.  Experimental test of quantum nonlocality in three-photon Greenberger–Horne–Zeilinger entanglement , 2000, Nature.

[54]  Introduction to homological geometry: part I , 2001, math/0104274.

[55]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[56]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[57]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[58]  M. Bourennane,et al.  QUANTUM KEY DISTRIBUTION USING MULTILEVEL ENCODING , 2001 .

[59]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[60]  J. Cirac,et al.  Long-distance quantum communication with atomic ensembles and linear optics , 2001, Nature.

[61]  Dag Roar Hjelme,et al.  Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography , 2001 .

[62]  H. Weinfurter,et al.  The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? , 2001, quant-ph/0104103.

[63]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[64]  Rüdiger L. Urbanke,et al.  The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.

[65]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[66]  Yoshihisa Yamamoto,et al.  Differential phase shift quantum key distribution. , 2002 .

[67]  Richard J. Hughes,et al.  Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.

[68]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[69]  H. Chau Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .

[70]  Hitoshi Inamori,et al.  Security of Practical Time-Reversed EPR Quantum Key Distribution , 2002, Algorithmica.

[71]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[72]  G Leuchs,et al.  Continuous variable quantum cryptography: beating the 3 dB loss limit. , 2002, Physical review letters.

[73]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[74]  H. Lo Method for decoupling error correction from privacy amplification , 2002, quant-ph/0201030.

[75]  C. G. Peterson,et al.  Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.

[76]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[77]  John Preskill,et al.  Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.

[78]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[79]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[80]  Eric J. Korevaar,et al.  Understanding the performance of free-space optics [Invited] , 2003 .

[81]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[82]  Norbert Lütkenhaus,et al.  Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.

[83]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[84]  Kiyoshi Tamaki,et al.  Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel , 2003, quant-ph/0308048.

[85]  M. Horodecki,et al.  Locking classical correlations in quantum States. , 2003, Physical review letters.

[86]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[87]  J. Preskill,et al.  Superselection rules and quantum protocols , 2003, quant-ph/0310088.

[88]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[89]  M. Ben-Or,et al.  General Security Definition and Composability for Quantum & Classical Protocols , 2004, quant-ph/0409062.

[90]  M. Fejer,et al.  Differential phase shift quantum key distribution experiment over 105 km fibre , 2005, quant-ph/0507110.

[91]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[92]  Evangelos Eleftheriou,et al.  Regular and irregular progressive edge-growth tanner graphs , 2005, IEEE Transactions on Information Theory.

[93]  Hoi Fung Chau,et al.  Unconditionally secure key distribution in higher dimensions by depolarization , 2004, IEEE Transactions on Information Theory.

[94]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[95]  Vikram Sharma,et al.  No-switching quantum key distribution using broadband modulated coherent light. , 2005, Physical review letters.

[96]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[97]  A. Vaziri,et al.  Experimental quantum coin tossing. , 2004, Physical review letters.

[98]  Frédéric Grosshans Collective attacks and unconditional security in continuous variable quantum key distribution. , 2005, Physical review letters.

[99]  Xiongfeng Ma Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.

[100]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[101]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[102]  V. Scarani,et al.  Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.

[103]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[104]  A. Acín,et al.  Security bounds for continuous variables quantum key distribution. , 2004, Physical review letters.

[105]  David Brumley,et al.  Remote timing attacks are practical , 2003, Comput. Networks.

[106]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[107]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[108]  Steven W. McLaughlin,et al.  Rate-compatible punctured low-density parity-check codes with short block lengths , 2006, IEEE Transactions on Information Theory.

[109]  S P Walborn,et al.  Quantum key distribution with higher-order alphabets using spatially encoded qudits. , 2006, Physical review letters.

[110]  E. Andersson,et al.  Experimentally realizable quantum comparison of coherent states and its applications , 2006, quant-ph/0601130.

[111]  W. Munro,et al.  Low Cost and Compact Quantum Cryptography , 2006, quant-ph/0608213.

[112]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[113]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[114]  Seth Lloyd,et al.  Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.

[115]  H. Lo,et al.  Decoy-state quantum key distribution with two-way classical postprocessing , 2006, quant-ph/0604094.

[116]  A. Vaziri,et al.  Experimental quantum cryptography with qutrits , 2005, quant-ph/0511163.

[117]  M. Koashi Unconditional security of quantum key distribution and the uncertainty principle , 2006 .

[118]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[119]  Miguel Navascués,et al.  Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.

[120]  J. Cirac,et al.  Extremality of Gaussian quantum states. , 2005, Physical review letters.

[121]  Xiongfeng Ma Unconditional security at a low cost , 2006 .

[122]  Tohya Hiroshima Additivity and multiplicativity properties of some Gaussian channels for Gaussian inputs , 2006 .

[123]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[124]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[125]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[126]  John C Howell,et al.  Large-alphabet quantum key distribution using energy-time entangled bipartite States. , 2007, Physical review letters.

[127]  C. Silberhorn,et al.  Quantum key distribution with passive decoy state selection , 2007 .

[128]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[129]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[130]  R. Werner,et al.  Reexamination of quantum bit commitment: The possible and the impossible , 2006, quant-ph/0605224.

[131]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[132]  J. Dynes,et al.  Unconditionally secure one-way quantum key distribution using decoy pulses , 2007, 2007 Quantum Electronics and Laser Science Conference.

[133]  Hai Xu,et al.  Detector dead-time effects and paralyzability in high-speed quantum key distribution , 2007 .

[134]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[135]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[136]  John Preskill,et al.  Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..

[137]  H. Lo,et al.  Quantum key distribution with entangled photon sources , 2007, quant-ph/0703122.

[138]  Christian Kurtsiefer,et al.  Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.

[139]  Renato Renner Symmetry implies independence , 2007 .

[140]  G. Guo,et al.  Experimental Decoy Quantum Key Distribution Up To 130KM Fiber , 2007, 0704.2941.

[141]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[142]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[143]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[144]  T. Ralph,et al.  Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise , 2007, 0705.2627.

[145]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[146]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[147]  Andrew W. Sharpe,et al.  Erratum: “Unconditionally secure one-way quantum key distribution using decoy pulses” [Appl. Phys. Lett. 90, 011118 (2007)] , 2007 .

[148]  M. Fejer,et al.  Generation of 10-GHz clock sequential time-bin entanglement. , 2007, Optics express.

[149]  Security proof for quantum-key-distribution systems with threshold detectors , 2008, 0803.4226.

[150]  Christian Schaffner,et al.  Cryptography from noisy storage. , 2007, Physical review letters.

[151]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[152]  K Horodecki,et al.  Unconditional privacy over channels which cannot convey quantum information. , 2008, Physical review letters.

[153]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[154]  H. Lo,et al.  Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.

[155]  Ivan Damgård,et al.  Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..

[156]  Normand J. Beaudry,et al.  Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.

[157]  Renato Renner,et al.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.

[158]  Guo Guangcan,et al.  Experimental Decoy State Quantum Key Distribution Over 120 km Fibre , 2008 .

[159]  Akihisa Tomita,et al.  Quantum encoder and decoder for practical quantum key distribution using a planar lightwave circuit , 2008 .

[160]  J. Dynes,et al.  Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.

[161]  Debbie W. Leung,et al.  Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity , 2006, IEEE Transactions on Information Theory.

[162]  S. Massar,et al.  Experimental quantum tossing of a single coin , 2008, 0804.4411.

[163]  Xiongfeng Ma Quantum cryptography: theory and practice , 2008 .

[164]  Richard J. Hughes,et al.  Practical long-distance quantum key distribution system using decoy levels , 2008, 0806.3085.

[165]  R. Hadfield Single-photon detectors for optical quantum information applications , 2009 .

[166]  Kai Chen,et al.  Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.

[167]  Nicolas Gisin,et al.  Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.

[168]  N. Lutkenhaus,et al.  Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks , 2008, 0807.3751.

[169]  E. Diamanti,et al.  Field test of a continuous-variable quantum key distribution prototype , 2008, 0812.3292.

[170]  Jian Wang,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.

[171]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[172]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[173]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[174]  Anthony Leverrier,et al.  Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.

[175]  F. Bussières,et al.  Flipping quantum coins , 2009, 0904.3946.

[176]  H. Weinfurter,et al.  Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .

[177]  Richard J. Hughes,et al.  Optical networking for quantum key distribution and quantum communications , 2009 .

[178]  Xiongfeng Ma,et al.  Security proof of quantum key distribution with detection efficiency mismatch , 2008, Quantum Inf. Comput..

[179]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[180]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[181]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[182]  Stephen M. Barnett,et al.  Quantum information , 2005, Acta Physica Polonica A.

[183]  Xiongfeng Ma,et al.  Universally composable and customizable post-processing for practical quantum key distribution , 2009, Comput. Secur..

[184]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[185]  James F. Dynes,et al.  Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .

[186]  Nicolas Gisin,et al.  Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.

[187]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.

[188]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[189]  N. Gisin,et al.  Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.

[190]  R. Renner,et al.  The uncertainty principle in the presence of quantum memory , 2009, 0909.0950.

[191]  A. Chailloux Improved Loss-Tolerant Quantum Coin Flipping , 2010, 1009.0044.

[192]  Xiongfeng Ma,et al.  Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.

[193]  James F. Dynes,et al.  Avoiding the blinding attack in QKD , 2010 .

[194]  H. Lo,et al.  Feasibility of quantum key distribution through a dense wavelength division multiplexing network , 2010, 1006.0726.

[195]  Seth Lloyd,et al.  Quantum cryptography approaching the classical limit. , 2010, Physical review letters.

[196]  Feihu Xu,et al.  Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.

[197]  Johannes Skaar,et al.  Security of quantum key distribution with arbitrary individual imperfections , 2009, 0903.3525.

[198]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[199]  Tao Zhang,et al.  Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.

[200]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[201]  Kai Chen,et al.  Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.

[202]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[203]  Dong Liu,et al.  Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.

[204]  Christian Kurtsiefer,et al.  Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.

[205]  Adam D. Smith,et al.  Leftover Hashing Against Quantum Side Information , 2010, IEEE Transactions on Information Theory.

[206]  N. Gisin,et al.  Long-term performance of the SwissQuantum quantum key distribution network in a field environment , 2011, 1203.4940.

[207]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[208]  T. Moroder,et al.  Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.

[209]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[210]  Hoi-Kwong Lo,et al.  Universal squash model for optical communications using linear optics and threshold detectors , 2011 .

[211]  Nicolas Brunner,et al.  Semi-device-independent security of one-way quantum key distribution , 2011, 1103.4105.

[212]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[213]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[214]  Vadim Makarov,et al.  Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.

[215]  J. F. Dynes,et al.  Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography , 2011, 1106.2675.

[216]  H. Weinfurter,et al.  Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.

[217]  J. Skaar,et al.  Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.

[218]  Mu-Sheng Jiang,et al.  Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system , 2011, 1203.0739.

[219]  Vadim Makarov,et al.  Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.

[220]  Elham Kashefi,et al.  Demonstration of Blind Quantum Computing , 2011, Science.

[221]  Chun-Yan Li,et al.  Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.

[222]  Chun-Yan Li,et al.  Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .

[223]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[224]  Anindya De,et al.  Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..

[225]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[226]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[227]  V. Scarani,et al.  One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering , 2011, 1109.1435.

[228]  P. J. Clarke,et al.  Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light , 2012, Nature communications.

[229]  Jürg Wullschleger,et al.  Unconditional Security From Noisy Quantum Storage , 2009, IEEE Transactions on Information Theory.

[230]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[231]  Sae Woo Nam,et al.  Conclusive quantum steering with superconducting transition-edge sensors , 2011, Nature Communications.

[232]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[233]  Elham Kashefi,et al.  Blind quantum computing with weak coherent pulses. , 2011, Physical review letters.

[234]  Chun-Mei Zhang,et al.  Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .

[235]  H. Weinfurter,et al.  Multiphoton entanglement and interferometry , 2003, 0805.2853.

[236]  A. W. Sharpe,et al.  Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.

[237]  S. Wehner,et al.  An experimental implementation of oblivious transfer in the noisy storage model , 2012, Nature Communications.

[238]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[239]  He Xu,et al.  Postprocessing for quantum random number generators: entropy evaluation and randomness extraction , 2012, ArXiv.

[240]  Jean Pierre von der Weid,et al.  Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. , 2012, Optics express.

[241]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[242]  Adrian Kent,et al.  Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes , 2011, Physical review letters.

[243]  Renato Renner,et al.  Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.

[244]  S. Wehner,et al.  Experimental implementation of bit commitment in the noisy-storage model , 2012, Nature Communications.

[245]  H. Lo,et al.  Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.

[246]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[247]  James F. Dynes,et al.  A quantum access network , 2013, Nature.

[248]  Thomas Brochmann Pedersen,et al.  High performance information reconciliation for QKD with CASCADE , 2013, Quantum Inf. Comput..

[249]  L. Liang,et al.  Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.

[250]  Agnes Ferenczi,et al.  Security proof methods for quantum key distribution protocols , 2013 .

[251]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[252]  E. Diamanti,et al.  Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.

[253]  Mu-Sheng Jiang,et al.  Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .

[254]  Jane E. Nordholt,et al.  Network-Centric Quantum Communications with Application to Critical Infrastructure Protection , 2013, ArXiv.

[255]  S. Goyal,et al.  Higher-dimensional orbital-angular-momentum-based quantum key distribution with mutually unbiased bases , 2013, 1402.5810.

[256]  Jian-Wei Pan,et al.  Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.

[257]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[258]  S. Lloyd,et al.  High-rate quantum cryptography in untrusted networks , 2013, 1312.4104.

[259]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[260]  S. Etcheverry,et al.  Quantum key distribution session with 16-dimensional photonic states , 2013, Scientific Reports.

[261]  Hoi-Kwong Lo,et al.  Long distance measurement-device-independent quantum key distribution with entangled photon sources , 2013, 1306.5814.

[262]  S. Wehner,et al.  Experimental bit commitment based on quantum communication and special relativity. , 2013, Physical review letters.

[263]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[264]  G. Guo,et al.  Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.

[265]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[266]  Feihu Xu,et al.  Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.

[267]  Jeffrey H. Shapiro,et al.  High-dimensional quantum key distribution using dispersive optics , 2012, Physical Review A.

[268]  Umesh V. Vazirani,et al.  Classical command of quantum systems , 2013, Nature.

[269]  L. Liang,et al.  Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.

[270]  Seth Lloyd,et al.  Quantum enigma machines , 2013, 1307.0380.

[271]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[272]  A R Dixon,et al.  Efficient decoy-state quantum key distribution with quantified security. , 2013, Optics express.

[273]  Pranab Sen,et al.  From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking , 2010, JACM.

[274]  Mohsen Razavi,et al.  Memory-assisted measurement-device-independent quantum key distribution , 2013, 1309.3406.

[275]  Marco Tomamichel,et al.  Secure Bit Commitment From Relativistic Constraints , 2012, IEEE Transactions on Information Theory.

[276]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[277]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[278]  David Elkouss,et al.  High-bit-rate continuous-variable quantum key distribution , 2014, 1406.1050.

[279]  Erika Andersson,et al.  Quantum digital signatures without quantum memory. , 2013, Physical review letters.

[280]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[281]  S. Guha,et al.  Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.

[282]  J G Rarity,et al.  Reference-frame-independent quantum-key-distribution server with a telecom tether for an on-chip client. , 2014, Physical review letters.

[283]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[284]  Feihu Xu,et al.  Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.

[285]  Jane Qiu,et al.  Quantum communications leap out of the lab , 2014, Nature.

[286]  Feihu Xu,et al.  Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.

[287]  E. Diamanti,et al.  Experimental plug and play quantum coin flipping , 2013, Nature Communications.

[288]  Zhu Cao,et al.  Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.

[289]  Gerd Leuchs,et al.  Distribution of squeezed states through an atmospheric channel. , 2014, Physical review letters.

[290]  R. Penty,et al.  Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks , 2014, 1402.1508.

[291]  Hoi-Kwong Lo,et al.  Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.

[292]  Hao Qin,et al.  Coexistence of continuous variable QKD with intense DWDM classical channels , 2014, 1412.1403.

[293]  M. Fejer,et al.  Experimental passive decoy-state quantum key distribution , 2014, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[294]  Jeffrey H. Shapiro,et al.  Entanglement-based quantum communication secured by nonlocal dispersion cancellation , 2014, Physical Review A.

[295]  Shihan Sajeed,et al.  Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing , 2014, ArXiv.

[296]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[297]  Dirk Englund,et al.  Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. , 2013, Physical review letters.

[298]  Andrew Sharpe,et al.  Field trial of a quantum secured 10 Gb/s DWDM transmission system over a single installed fiber. , 2014, Optics express.

[299]  Umesh Vazirani,et al.  Fully device-independent quantum key distribution. , 2012, 1210.1810.

[300]  Seth Lloyd,et al.  Robust quantum data locking from phase modulation , 2014 .

[301]  Hermann Kampermann,et al.  Measurement-device-independent quantum key distribution with quantum memories , 2013, 1306.3095.

[302]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[303]  C. Wittmann,et al.  Atmospheric continuous-variable quantum communication , 2014, 1406.1321.

[304]  A. R. Dixon,et al.  High speed and adaptable error correction for megabit/s rate quantum key distribution , 2014, Scientific Reports.

[305]  Yong Zhao,et al.  Experimental unconditionally secure bit commitment. , 2013, Physical review letters.

[306]  Wei Chen,et al.  Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources , 2014, 1407.1924.

[307]  J. Skaar,et al.  Laser damage helps the eavesdropper in quantum cryptography. , 2013, Physical review letters.

[308]  R. Werner,et al.  Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement , 2015 .

[309]  Fabian Furrer,et al.  Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle , 2014, 1405.5965.

[310]  Gerd Leuchs,et al.  Trojan-horse attacks threaten the security of practical quantum cryptography , 2014, 1406.5813.

[311]  P. J. Clarke,et al.  Realization of quantum digital signatures without the requirement of quantum memory. , 2013, Physical review letters.

[312]  V. Makarov,et al.  Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[313]  D. Gauthier,et al.  High-dimensional quantum cryptography with twisted light , 2014, 1402.7113.

[314]  Shuang Wang,et al.  Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.

[315]  Kaushik Chakraborty,et al.  Arbitrarily long relativistic bit commitment , 2015, Physical review letters.

[316]  V. Dunjko,et al.  Quantum digital signatures with quantum-key-distribution components , 2014, 1403.5551.

[317]  Hoi-Kwong Lo,et al.  Measurement-Device-Independent Quantum Cryptography , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[318]  Kai Chen,et al.  Experimental multiplexing of quantum key distribution with classical optical communication , 2015 .

[319]  Eleni Diamanti,et al.  Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.

[320]  Shihan Sajeed,et al.  Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch , 2015, 1502.02785.

[321]  Yang Liu,et al.  Measurement-device-independent quantum key distribution over untrustful metropolitan network , 2015, 1509.08389.

[322]  Gerd Leuchs,et al.  Attacks on practical quantum key distribution systems (and how to prevent them) , 2015, 1512.07990.

[323]  Xiongfeng Ma,et al.  Intrinsic randomness as a measure of quantum coherence , 2015, 1505.04032.

[324]  Koji Azuma,et al.  All-photonic intercity quantum key distribution , 2015, Nature Communications.

[325]  Zhu Cao,et al.  Experimental passive round-robin differential phase-shift quantum key distribution. , 2015, Physical review letters.

[326]  S. Wehner,et al.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.

[327]  Vladyslav C. Usenko,et al.  Unidimensional continuous-variable quantum key distribution , 2015, 1504.07093.

[328]  P. Jouguet,et al.  Robust shot-noise measurement for continuous-variable quantum key distribution , 2014, 1406.7554.

[329]  T Lunghi,et al.  Practical Relativistic Bit Commitment. , 2014, Physical review letters.

[330]  Feihu Xu Measurement-device-independent quantum communication with an untrusted source , 2015, 1508.00970.

[331]  Bing Qi,et al.  Discrete and continuous variables for measurement-device-independent quantum cryptography , 2015, Nature Photonics.

[332]  Peng Huang,et al.  High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.

[333]  Qiang Zhou,et al.  Measurement-device-independent quantum key distribution: from idea towards application , 2015, 1501.07307.

[334]  Hoi-Kwong Lo,et al.  Experimental quantum key distribution with source flaws , 2015 .

[335]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[336]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[337]  Zhen Zhang,et al.  Field Test of Measurement-Device-Independent Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[338]  Nicolas Gisin,et al.  Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[339]  Peng Huang,et al.  Continuous-variable quantum key distribution with 1 Mbps secure key rate. , 2015, Optics express.

[340]  Hoi-Kwong Lo,et al.  All-photonic quantum repeaters , 2013, Nature Communications.

[341]  Rob Thew,et al.  Provably secure and practical quantum key distribution over 307 km of optical fibre , 2014, Nature Photonics.

[342]  W. Munro,et al.  Inside Quantum Repeaters , 2015, IEEE Journal of Selected Topics in Quantum Electronics.

[343]  S. Pirandola,et al.  General Benchmarks for Quantum Repeaters , 2015, 1512.04945.

[344]  James F. Dynes,et al.  Practical security bounds against the Trojan-horse attack in quantum key distribution , 2015, 1506.01989.

[345]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[346]  G. Guo,et al.  Experimental demonstration of quantum key distribution without monitoring of the signal disturbance , 2015, 1505.07884.

[347]  D. Englund,et al.  Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding , 2015 .

[348]  Jun Zhang,et al.  Advances in InGaAs/InP single-photon detector systems for quantum communication , 2015, Light: Science & Applications.

[349]  Yong-Su Kim,et al.  Plug-and-Play Measurement-Device-Independent Quantum Key Distribution , 2015, 1501.03344.

[350]  Hoi-Kwong Lo,et al.  Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.

[351]  H. Weinfurter,et al.  Design and Evaluation of a Handheld Quantum Key Distribution Sender module , 2015, IEEE Journal of Selected Topics in Quantum Electronics.

[352]  Zhu Cao,et al.  Quantum random number generation , 2015, npj Quantum Information.

[353]  Masato Koashi,et al.  Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.

[354]  Bing Qi,et al.  Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection , 2015, 1503.00662.

[355]  Shihan Sajeed,et al.  Testing Random-Detector-Efficiency Countermeasure in a Commercial System Reveals a Breakable Unrealistic Assumption , 2016, IEEE Journal of Quantum Electronics.

[356]  Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices , 2016, J. ACM.

[357]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[358]  Romain All'eaume,et al.  Self-coherent phase reference sharing for continuous-variable quantum key distribution , 2016, 1605.03642.

[359]  Raman Kashyap,et al.  Creation of backdoors in quantum communications via laser damage , 2015, 1510.03148.

[360]  Patrick J. Coles,et al.  Numerical approach for unstructured quantum key distribution , 2015, Nature Communications.

[361]  Wesley D. Sacher,et al.  Silicon photonic transmitter for polarization-encoded quantum key distribution , 2016 .

[362]  Jian-Wei Pan,et al.  An efficient quantum light–matter interface with sub-second lifetime , 2015, Nature Photonics.

[363]  Vladyslav C. Usenko,et al.  Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense , 2016, Entropy.

[364]  Masahide Sasaki,et al.  Experimental transmission of quantum digital signatures over 90  km of installed optical fiber using a differential phase shift quantum key distribution system. , 2016, Optics letters.

[365]  Félix Bussières,et al.  24-Hour Relativistic Bit Commitment. , 2016, Physical review letters.

[366]  J. F. Dynes,et al.  Directly Phase-Modulated Light Source , 2016, Physical Review X.

[367]  Seth Lloyd,et al.  Quantum enigma machine: Experimentally demonstrating quantum data locking. , 2016, Physical review. A.

[368]  Tao Wang,et al.  Field demonstration of a continuous-variable quantum key distribution network. , 2016, Optics letters.

[369]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[370]  Horace P. Yuen,et al.  Security of Quantum Key Distribution , 2016, IEEE Access.

[371]  Adeline Orieux,et al.  Recent advances on integrated quantum communications , 2016, 1606.07346.

[372]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[373]  Masahide Sasaki,et al.  Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.

[374]  Marco Lucamarini,et al.  Decoy-state quantum key distribution with a leaky source , 2016, New Journal of Physics.

[375]  Hao Qin,et al.  Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution , 2015, 1511.01007.

[376]  R. Boyd,et al.  High-dimensional intracity quantum cryptography with structured photons , 2016, 1612.05195.

[377]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[378]  Joseph Fitzsimons,et al.  Private quantum computation: an introduction to blind quantum computing and related protocols , 2016, npj Quantum Information.

[379]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[380]  Christian Schaffner,et al.  Quantum cryptography beyond quantum key distribution , 2015, Designs, Codes and Cryptography.

[381]  Feihu Xu,et al.  Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution , 2016, 1609.02648.

[382]  James F. Dynes,et al.  Ultra-high bandwidth quantum secured data transmission , 2016, Scientific Reports.

[383]  Zhu Cao,et al.  Experimental quantum data locking , 2016 .

[384]  Leif Katsuo Oxenløwe,et al.  High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits , 2016, npj Quantum Information.

[385]  V. Dunjko,et al.  Experimental demonstration of kilometer-range quantum digital signatures , 2015, 1509.07827.

[386]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[387]  Wei Chen,et al.  Experimental round-robin differential phase-shift quantum key distribution , 2015, 1505.08142.

[388]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[389]  Yang Li,et al.  Long-distance free-space quantum key distribution in daylight towards inter-satellite communication , 2017, Nature Photonics.

[390]  D. Trotter,et al.  Metropolitan quantum key distribution with silicon photonics , 2017, 1708.00434.

[391]  Yang Liu,et al.  Experimental measurement-device-independent quantum digital signatures over a metropolitan network , 2017, 1703.01021.

[392]  Ning Wang,et al.  Imperfect state preparation in continuous-variable quantum key distribution , 2017 .

[393]  Qiang Zhou,et al.  A cost-effective measurement-device-independent quantum key distribution system for quantum networks , 2017, 1702.05155.

[394]  C. M. Natarajan,et al.  Chip-based quantum key distribution , 2015, Nature Communications.

[395]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[396]  Miguel Herrero-Collantes,et al.  Quantum random number generators , 2016, 1604.03304.

[397]  H. Weinfurter,et al.  Event-Ready Bell Test Using Entangled Atoms Simultaneously Closing Detection and Locality Loopholes. , 2016, Physical review letters.

[398]  Andrew J. Shields,et al.  Long-distance quantum key distribution secure against coherent attacks , 2017 .

[399]  Jian-Wei Pan,et al.  Long-distance copropagation of quantum key distribution and terabit classical optical data channels , 2016, 1610.04475.

[400]  G. Vallone,et al.  High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers , 2016, 1610.01682.

[401]  Masoud Mohseni,et al.  Commercialize quantum technologies in five years , 2017, Nature.

[402]  Xiongfeng Ma,et al.  Experimental Blind Quantum Computing for a Classical Client. , 2017, Physical review letters.

[403]  Daniel J Gauthier,et al.  Provably secure and high-rate quantum key distribution with time-bin qudits , 2017, Science Advances.

[404]  J F Dynes,et al.  Experimental measurement-device-independent quantum digital signatures , 2017, Nature Communications.

[405]  J. E. Kennard,et al.  Integrated silicon photonics for high-speed quantum key distribution , 2016, 2017 Conference on Lasers and Electro-Optics (CLEO).

[406]  Yongmei Huang,et al.  Satellite-to-ground quantum key distribution , 2017, Nature.

[407]  C. Marquardt,et al.  Free-space quantum links under diverse weather conditions , 2017, 1707.04932.

[408]  A. W. Sharpe,et al.  Best-Practice Criteria for Practical Security of Self-Differencing Avalanche Photodiode Detectors in Quantum Key Distribution , 2017, 1712.06520.

[409]  Sebastian Kleis,et al.  Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals. , 2017, Optics letters.

[410]  G. Guo,et al.  Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .

[411]  Xiongfeng Ma,et al.  Improved key-rate bounds for practical decoy-state quantum-key-distribution systems , 2016, 1611.02524.

[412]  Patrick J. Coles,et al.  Entropic uncertainty relations and their applications , 2015, 1511.04857.

[413]  Hong Cai,et al.  Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution. , 2017, Optics express.

[414]  Hui Liu,et al.  Experimental quantum digital signature over 102 km , 2016, 1608.01086.

[415]  Feihu Xu,et al.  Quantum-memory-assisted multi-photon generation for efficient quantum information processing , 2017, 1704.00879.

[416]  Rong Wang,et al.  Improved security bound for the round-robin-differential-phase-shift quantum key distribution , 2018, Nature Communications.

[417]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[418]  Marcos Curty,et al.  Finite-key security analysis for quantum key distribution with leaky sources , 2018, New Journal of Physics.

[419]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[420]  Marco Lucamarini,et al.  Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound , 2018, 1805.05511.

[421]  Kunchi Peng,et al.  Long-Distance Continuous-Variable Quantum Key Distribution with Entangled States , 2018, Physical Review Applied.

[422]  Hoi-Kwong Lo,et al.  Enabling a Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Network , 2018 .

[423]  Christian Weedbrook,et al.  Security proof of continuous-variable quantum key distribution using three coherent states , 2017, 1709.01758.

[424]  Shuang Wang,et al.  Hacking the Quantum Key Distribution System by Exploiting the Avalanche-Transition Region of Single-Photon Detectors , 2018, Physical Review Applied.

[425]  Jian-Wei Pan,et al.  Satellite-Relayed Intercontinental Quantum Network. , 2018, Physical review letters.

[426]  F. Bussières,et al.  Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.

[427]  Rupesh Kumar,et al.  Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.

[428]  Paolo Villoresi,et al.  Space QUEST mission proposal: experimentally testing decoherence due to gravity , 2017, New Journal of Physics.

[429]  Qiang Zhang,et al.  Large scale quantum key distribution: challenges and solutions [Invited]. , 2018, Optics express.

[430]  Philip Walther,et al.  Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.

[431]  Marco Lucamarini,et al.  10-Mb/s Quantum Key Distribution , 2018, Journal of Lightwave Technology.

[432]  Xiongfeng Ma,et al.  Phase-Matching Quantum Key Distribution , 2018, Physical Review X.

[433]  Yang Liu,et al.  Device-independent quantum random-number generation , 2018, Nature.

[434]  Xiongfeng Ma,et al.  One-Shot Coherence Dilution. , 2017, Physical review letters.

[435]  Quantum Communications and Cryptography , 2018 .

[436]  V. Makarov,et al.  Quantum key distribution with distinguishable decoy states , 2017, Physical Review A.

[437]  Z. L. Yuan,et al.  A direct GHz-clocked phase and intensity modulated transmitter applied to quantum key distribution. , 2018 .

[438]  Jie Lin,et al.  Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.

[439]  Haiqiang Ma,et al.  Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration , 2018, Optica.

[440]  Zong-Wen Yu,et al.  Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.

[441]  Norbert Lütkenhaus,et al.  Eavesdropping and countermeasures for backflash side channel in quantum cryptography. , 2018, Optics express.

[442]  Qiang Zhang,et al.  Integrating quantum key distribution with classical communications in backbone fiber network. , 2017, Optics express.

[443]  Masato Koashi,et al.  Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses , 2018 .

[444]  Patrick J. Coles,et al.  Reliable numerical key rates for quantum key distribution , 2017, Quantum.

[445]  S. Wehner,et al.  Quantum internet: A vision for the road ahead , 2018, Science.

[446]  Tao Wang,et al.  High key rate continuous-variable quantum key distribution with a real local oscillator. , 2018, Optics express.

[447]  Guihua Zeng,et al.  Feasibility of All-Day Quantum Communication with Coherent Detection , 2019, Physical Review Applied.

[448]  John C. Platt,et al.  Quantum supremacy using a programmable superconducting processor , 2019, Nature.

[449]  J. F. Dynes,et al.  Cambridge quantum network , 2019, npj Quantum Information.

[450]  Li Li,et al.  Experimental quantum repeater without quantum memory , 2019, Nature Photonics.

[451]  Qiang Zhang,et al.  Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.

[452]  S Wehner,et al.  Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.

[453]  Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution , 2019, Physical Review X.

[454]  Rong Wang,et al.  Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.

[455]  Vadim Makarov,et al.  Laser-seeding Attack in Quantum Key Distribution , 2019, Physical Review Applied.

[456]  M. Peev,et al.  Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator , 2017, Quantum.

[457]  Mei Li,et al.  Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.

[458]  Hoi-Kwong Lo,et al.  Simple security proof of twin-field type quantum key distribution protocol , 2018, npj Quantum Information.

[459]  Xiongfeng Ma,et al.  Symmetry-Protected Privacy: Beating the Rate-Distance Linear Bound Over a Noisy Channel , 2019, Physical Review Applied.

[460]  Hoi-Kwong Lo,et al.  Foiling covert channels and malicious classical post-processing units in quantum key distribution , 2017, npj Quantum Information.

[461]  Hao Li,et al.  Surpassing the rate-transmittance linear bound of quantum key distribution , 2019, 1908.01271.

[462]  Xiongfeng Ma,et al.  Operational interpretation of coherence in quantum key distribution , 2018, Physical Review A.

[463]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.

[464]  Leif Katsuo Oxenløwe,et al.  Orbital Angular Momentum States Enabling Fiber-based High-dimensional Quantum Communication , 2018, Physical Review Applied.

[465]  Anthony Leverrier,et al.  Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation , 2019, Physical Review X.

[466]  Feihu Xu,et al.  Implementation security of quantum key distribution due to polarization-dependent efficiency mismatch , 2019, Physical Review A.

[467]  Yasushi Hasegawa,et al.  Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters , 2019, Nature Communications.

[468]  Hoi-Kwong Lo,et al.  Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks , 2018, Physical Review X.

[469]  Wee Ser,et al.  An integrated silicon photonic chip platform for continuous-variable quantum key distribution , 2019, Nature Photonics.

[470]  Thomas Roger,et al.  A modulator-free quantum key distribution transmitter chip , 2019, npj Quantum Information.

[471]  Antonios Varvitsiotis,et al.  Characterising the correlations of prepare-and-measure quantum networks , 2018, npj Quantum Information.

[472]  Hao Li,et al.  Remote Blind State Preparation with Weak Coherent Pulses in the Field. , 2019, Physical review letters.

[473]  Jian-Wei Pan,et al.  Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels. , 2018, Physical review letters.

[474]  N. Lutkenhaus,et al.  Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence , 2019, Physical Review A.

[475]  Masato Koashi,et al.  Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit , 2019, Nature Communications.

[476]  B. Gopinath,et al.  THE BELL SYSTEM , 2019 .

[477]  Shuang Wang,et al.  Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.

[478]  Li Qian,et al.  Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.

[479]  Jun Gao,et al.  Hacking Quantum Key Distribution via Injection Locking , 2019, Physical Review Applied.

[480]  Hong Guo,et al.  Long-distance continuous-variable quantum key distribution over 202.81 km fiber , 2020, 2001.02555.

[481]  Gustavo Lima,et al.  Quantum information processing with space-division multiplexing optical fibres , 2019, Communications Physics.

[482]  Jian-Wei Pan,et al.  Entanglement of two quantum memories via fibres over dozens of kilometres , 2020, Nature.

[483]  Renato Renner,et al.  Advantage Distillation for Device-Independent Quantum Key Distribution. , 2019, Physical review letters.

[484]  H. Lo,et al.  Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses , 2020, npj Quantum Information.

[485]  Jian-Wei Pan,et al.  Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. , 2019, Physical review letters.

[486]  S. Guha,et al.  Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution , 2019, Physical Review A.