The paper analyzes security aspects of practical entanglement-based quantum key distribution (QKD), namely, BBM92 or entanglement-based BB84 protocol. Similar to prepare-and-measure QKD protocols, practical implementations of the entanglement-based QKD have to rely upon non-ideal photon sources. A typical solution for entanglement generation is the spontaneous parametric down-conversion. However, this process creates not only single photon pairs, but also quantum states with more than two photons, which potentially may lead to security deterioration. We show that this effect does not impair the security of entanglement-based QKD systems. We also review the available security proofs and show that properties of the entanglement source have no...
peer reviewedWe propose some simple changes to a class of Quantum Key Distribution protocols. The fi...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
A parametric down-conversion (PDC) source can be used as either a triggered single photon source or ...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a poi...
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus p...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to incr...
In theory, quantum key distribution (QKD) allows secure communications between two parties based on ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key...
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its sec...
peer reviewedWe propose some simple changes to a class of Quantum Key Distribution protocols. The fi...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
A parametric down-conversion (PDC) source can be used as either a triggered single photon source or ...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a poi...
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus p...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to incr...
In theory, quantum key distribution (QKD) allows secure communications between two parties based on ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key...
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its sec...
peer reviewedWe propose some simple changes to a class of Quantum Key Distribution protocols. The fi...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...