Search Results - "Lim, Charles Ci Wen"
-
1
Finite-key security analysis of quantum key distribution with imperfect light sources
Published in New journal of physics (09-09-2015)“…In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with…”
Get full text
Journal Article -
2
Device-Independent Quantum Key Distribution with Local Bell Test
Published in Physical review. X (01-07-2013)“…Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell’s inequality between two parties, Alice and Bob, who…”
Get full text
Journal Article -
3
Tight finite-key analysis for quantum cryptography
Published in Nature communications (17-01-2012)“…Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is…”
Get full text
Journal Article -
4
Security Analysis of Quantum Key Distribution with Small Block Length and Its Application to Quantum Space Communications
Published in Physical review letters (12-03-2021)“…The security of real-world quantum key distribution (QKD) critically depends on the number of data points the system can collect in a finite time interval. To…”
Get full text
Journal Article -
5
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Published in Entropy (Basel, Switzerland) (31-12-2020)“…Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of…”
Get full text
Journal Article -
6
Characterising the correlations of prepare-and-measure quantum networks
Published in npj quantum information (08-02-2019)“…Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on…”
Get full text
Journal Article -
7
Bright-light detector control emulates the local bounds of Bell-type inequalities
Published in Scientific reports (06-08-2020)“…It is well-known that no local model—in theory—can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than…”
Get full text
Journal Article -
8
Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution
Published in IEEE journal of selected topics in quantum electronics (01-05-2015)“…In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal…”
Get full text
Journal Article -
9
Detector-device-independent quantum key distribution
Published in Applied physics letters (01-12-2014)“…Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass…”
Get full text
Journal Article -
10
Concise security bounds for practical decoy-state quantum key distribution
Published in Physical review. A, Atomic, molecular, and optical physics (10-02-2014)Get full text
Journal Article -
11
Securing Practical Quantum Communication Systems with Optical Power Limiters
Published in PRX quantum (01-07-2021)“…Controlling the energy of unauthorized light signals in a quantum cryptosystem is an essential criterion for implementation security. Here, we propose a…”
Get full text
Journal Article -
12
Security of distributed-phase-reference quantum key distribution
Published in Physical review letters (26-12-2012)“…Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof…”
Get full text
Journal Article -
13
Discrete-variable quantum key distribution with homodyne detection
Published in Quantum (Vienna, Austria) (03-01-2022)“…Most quantum key distribution (QKD) protocols can be classified as either a discrete-variable (DV) protocol or continuous-variable (CV) protocol, based on how…”
Get full text
Journal Article -
14
Finite-key analysis for measurement-device-independent quantum key distribution
Published in Nature communications (29-04-2014)“…Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security…”
Get full text
Journal Article -
15
Provably secure and practical quantum key distribution over 307km of optical fibre
Published in Nature photonics (01-03-2015)“…Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD…”
Get full text
Journal Article -
16
Self-testing quantum random number generator
Published in Physical review letters (17-04-2015)“…The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is…”
Get full text
Journal Article -
17
Provably secure and practical quantum key distribution over 307 km of optical fibre
Published in Nature photonics (01-03-2015)“…A discrete-variable quantum key distribution system that is capable of distributing a provably-secure cryptographic key over 307 kilometres is demonstrated at…”
Get full text
Journal Article -
18
Provably-secure symmetric private information retrieval with quantum cryptography
Published 18-01-2021“…Entropy 23, 54 (2021) Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular…”
Get full text
Journal Article -
19
Provably secure and high-rate quantum key distribution with time-bin qudits
Published in Science advances (01-11-2017)“…The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features…”
Get full text
Journal Article -
20
Provably-secure quantum randomness expansion with uncharacterised homodyne detection
Published 09-06-2022“…Quantum random number generators (QRNGs) are able to generate numbers that are certifiably random, even to an agent who holds some side-information. Such…”
Get full text
Journal Article