Improving the security of quantum key distribution with multi-step advantage distillation.
Quantum Inf. Process., April, 2024
Practical measurement-device-independent quantum key distribution with advantage distillation.
Quantum Inf. Process., January, 2023
Estimating security of the quantum key distribution from the guesswork.
Quantum Inf. Process., 2022
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
Entropy, 2022
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources.
Entropy, 2021
Security of BB84 with weak randomness and imperfect qubit encoding.
Quantum Inf. Process., 2018
Monitoring the intercept-resend attack with the weak measurement model.
Quantum Inf. Process., 2018
Key-leakage evaluation of authentication in quantum key distribution with finite resources.
Quantum Inf. Process., 2014
Reference-free-independent quantum key distribution immune to detector side channel attacks.
Quantum Inf. Process., 2014
Decoy state measurement-device-independent quantum key distribution based on the Clauser-Horne-Shimony-Holt inequality.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2014
Field and long-term demonstration of a wide area quantum key distribution network.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2014
A study of BB84 protocol in a device-independent scenario: from the view of entanglement distillation.
Quantum Inf. Comput., 2013
Security of quantum key distribution with state-dependent imperfections.
Quantum Inf. Comput., 2011
Security of practical quantum key distribution system.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011
Security of practical phase-coding quantum key distribution.
Quantum Inf. Comput., 2010