• Publications
  • Influence
Measurement-device-independent quantum key distribution.
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum keyExpand
  • 871
  • 46
  • PDF
Secure quantum key distribution
An overview is given of the state-of-the-art research into secure communication based on quantum cryptography. The present security model together with its assumptions, strengths and weaknesses isExpand
  • 563
  • 19
  • PDF
Simple security proof of twin-field type quantum key distribution protocol
TLDR
We introduce a TF-type QKD protocol which is conceptually simpler than the original proposal. Expand
  • 48
  • 8
  • PDF
Entanglement as a precondition for secure quantum key distribution.
We demonstrate that a necessary precondition for an unconditionally secure quantum key distribution is that both sender and receiver can use the available measurement results to prove the presence ofExpand
  • 187
  • 7
  • PDF
Concise security bounds for practical decoy-state quantum key distribution
Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups haveExpand
  • 149
  • 6
  • PDF
Loss-tolerant quantum cryptography with imperfect sources
In principle, quantum key distribution (QKD) offers unconditional security based on the laws of physics. In practice, flaws in the state preparation undermine the security of QKD systems, as standardExpand
  • 86
  • 6
  • PDF
Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode.
We demonstrate a high bit-rate quantum random number generator by interferometric detection of phase diffusion in a gain-switched DFB laser diode. Gain switching at few-GHz frequencies produces aExpand
  • 82
  • 4
  • PDF
Experimentally realizable quantum comparison of coherent states and its applications
When comparing quantum states to each other, it is possible to obtain an unambiguous answer, indicating that the states are definitely different, already after a single measurement. In this paper weExpand
  • 78
  • 4
  • PDF
Practical aspects of measurement-device-independent quantum key distribution
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD), removes all attacks from the detection system, the most vulnerable part in QKD implementations. In this paper, weExpand
  • 77
  • 4
  • PDF
Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator andExpand
  • 94
  • 3
  • PDF