The quantum cryptography theoretically aims to promise unconditional information security in the physical layer against an omnipotent eavesdropper. However, such a conventional assumption of an all-powerful eavesdropper can be too strict for certain practical implementation scenarios and can be relaxed considerably. This dissertation reviews the relevant theories on secret key rate bounds, proposes a geometrical optics restricted eavesdropping model and studies secret-key distillation across a lossy and noisy quantum wiretap channel between Alice and Bob, with a separately parameterized realistically lossy quantum channel to the eavesdropper Eve. We show that under such restricted eavesdropping, the key rates achievable can exceed the secre...
Upper bounds for private communication over quantum channels can be derived by adopting channel simu...
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shar...
Quantum physics allows for unconditionally secure communication through insecure communication chann...
Quantum cryptography provides absolute security against an all-powerful eavesdropper (Eve). However,...
We study information-theoretical security for space links between a satellite and a ground station.Q...
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted...
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted...
Quantum key distribution (QKD) assures the theoretical information security from the physical layer ...
Satellite quantum communications are emerging within the panorama of quantum technologies as a more ...
Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed...
Global quantum communications will enable long-distance secure data transfer, networked distributed ...
The secure distribution of the secret random bit sequences known as key material, is an essential pr...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fib...
Establishing secure communication links at a global scale is a major potential application of quantu...
Upper bounds for private communication over quantum channels can be derived by adopting channel simu...
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shar...
Quantum physics allows for unconditionally secure communication through insecure communication chann...
Quantum cryptography provides absolute security against an all-powerful eavesdropper (Eve). However,...
We study information-theoretical security for space links between a satellite and a ground station.Q...
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted...
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted...
Quantum key distribution (QKD) assures the theoretical information security from the physical layer ...
Satellite quantum communications are emerging within the panorama of quantum technologies as a more ...
Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed...
Global quantum communications will enable long-distance secure data transfer, networked distributed ...
The secure distribution of the secret random bit sequences known as key material, is an essential pr...
In this article we deal with the security of the BB84 quantum cryptography protocol over noisy chann...
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fib...
Establishing secure communication links at a global scale is a major potential application of quantu...
Upper bounds for private communication over quantum channels can be derived by adopting channel simu...
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shar...
Quantum physics allows for unconditionally secure communication through insecure communication chann...