Proof of unconditional security of six-state quantum key distribution scheme | 7 |

One-Way Functions in Reversible Computations | 110 |

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution | 52 |

Finite-key analysis for measurement-device-independent quantum key distribution | 10 |

Quantum key distribution with entangled photon sources | 7 |

Security proof of quantum key distribution with detection efficiency mismatch | 6 |

Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources | 7 |

Ultrafast quantum random number generation based on quantum phase fluctuations | 12 |

A survey on quantum cryptographic protocols and their security | 6 |

Quantum key distribution with setting-choice-independently correlated light sources | 9 |

Quantum key distribution based on a Sagnac loop interferometer and polarization-insensitive phase modulators | 3 |

Efficient experimental quantum fingerprinting with channel multiplexing and simultaneous detection | 10 |

Loss-tolerant quantum key distribution with mixed signal states | 14 |

Making an empty promise with a quantum computer | 64 |

Erratum: Optimal entanglement transformations among N-qubit W-class states (Physical Review A - Atomic, Molecular, and Optical Physics (2010) 82 062314)) | 6 |

Security of high speed quantum key distribution with finite detector dead time | 8 |

Simple security proof of twin-field type quantum key distribution protocol | 12 |

Measurement-device-independent QKD over asymmetric channels | 33 |

Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters | 12 |

Is baryon number violated when electroweak strings intercommute? | 8 |

Excess noise control in Gaussian-modulated coherent state quantum key distribution system | 13 |

A quantum analog of Huffman coding | 56 |

Long distance measurement-device-independent quantum key distribution with entangled photon sources | 52 |

Method for decoupling error correction from privacy amplification | 10 |

Broadband multipoint sensing with single-arm frequency-shifted interferometry | 19 |

Practical measurement device independent quantum key distribution | 11 |

High-speed quantum random number generation by measuring phase noise of a single-mode laser | 11 |

Quantum Encryption | 33 |

Randomly distilling W-class states into general configurations of two-party entanglement | 11 |

Practical aspects of measurement-device-independent quantum key distribution | 8 |

Decoy state protocols for quantum cryptography with parametric down conversion sources | 18 |

Unconditional security of quantum key distribution over arbitrarily long distances | 252 |

Efficient quantum key distribution scheme and a proof of its unconditional security | 666 |

Foiling covert channels and malicious classical post-processing units in quantum key distribution | 12 |

Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity | 11 |

All-photonic quantum repeaters | 53 |

Experimental quantum key distribution with active phase randomization | 18 |

Interrogation of multiplexed fiber grating sensors using frequency-shifted interferometer | 16 |

Complementary in wormhole chromodynamics | 153 |

Quantum key distribution based on arbitrarily weak distillable entangled states | 11 |

Simple Multiuser Twin-Field Quantum Key Distribution Network | 11 |

Performance of two quantum-key-distribution protocols | 11 |

Quantum cryptology | 8 |

Loss-tolerant quantum cryptography with imperfect sources | 12 |

Proof of security of quantum key distribution with two-way classical communications | 6 |

Unconditionally secure key distillation from multiphotons | 7 |

Exact wave functions for non-Abelian Chern-Simons particles | 7 |

Secure quantum communication in the presence of phase- and polarization-dependent loss | 6 |

A simple proof of the unconditional security of quantum key distribution | 6 |

Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers | 13 |

Quantum coding theorem for mixed states | 7 |

Discrete-phase-randomized coherent state source and its application in quantum key distribution | 56 |

Experimental measurement-device-independent quantum key distribution with imperfect sources | 9 |

Bounds on probability of transformations between multipartite pure states | 7 |

Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals | 9 |

Aharonov-Bohm order parameters for non-Abelian gauge theories | 10 |

Practical challenges in quantum key distribution | 14 |

Measurement-device-independent quantum cryptography | 8 |

Gaussian-modulated coherent state quantum key distribution experiment over 20km telecommunication fiber | 9 |

Time-shift attack in practical quantum cryptosystems | 33 |

Classical communication cost of entanglement manipulation: Is entanglement an inter-convertible resource? | 7 |

Decoy state quantum key distribution | 20 |

Increasing entanglement monotones by separable operations | 12 |

Quantum key distribution with an untrusted source | 19 |

Security of quantum key distribution using weak coherent states with nonrandom phases | 26 |

Discrete rotational symmetry and quantum-key-distribution protocols | 13 |

Bridging the gap between theory and practice in quantum cryptography | 20 |

Quantum key distribution secure against partly malicious devices | 56 |

Measurement-device-independent quantum key distribution | 14 |

Decoy state quantum key distribution | 19 |

Upper bounds for the secure key rate of the decoy-state quantum key distribution | 7 |

Experimental quantum fingerprinting with weak coherent pulses | 89 |

Absolute maximal entanglement and quantum secret sharing | 33 |

Quantum key distribution with vacua or dim pulses as decoy states | 7 |

Experimental quantum key distribution with source flaws | 11 |

Quantum key distribution with triggering parametric down-conversion sources | 7 |

Security of quantum key distribution | 38 |

Random-party entanglement distillation in multiparty states | 33 |

Erratum: Randomly distilling W-class states into general configurations of two-party entanglement (Physical Review A (2011) 84 (052301)) | 10 |

A quantum leap in security | 10 |

Quantum hacking: Attacking practical quantum key distribution systems | 5 |

How to share a quantum secret | 5 |

How to share a quantum secret | 7 |

Universal squash model for optical communications using linear optics and threshold detectors | 64 |

One-way continuous-variable quantum key distribution over 5km of standard telecom fiber | 10 |

Security of quantum bit string commitment depends on the information measure | 25 |

Secure quantum key distribution | 49 |

Cryptography's quantum barrier | 8 |

Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution | 19 |

Security of quantum key distribution with iterative sifting | 6 |

Experimental quantum key distribution with active phase randomization | 17 |

Practical decoy state for quantum key distribution | 10 |

Decoy-state quantum key distribution with two-way classical postprocessing | 10 |

Free-space reconfigurable quantum key distribution network | 21 |

Toward a reconfigurable quantum network enabled by a broadband entangled source | 11 |

Space QUEST mission proposal: Experimentally testing decoherence due to gravity | 8 |

Making an empty promise with a quantum computer | 186 |

Security of quantum key distribution with detection efficiency mismatch | 507 |

Optimal entanglement transformations among N-qubit W-class states | 7 |

Insecurity of quantum secure computations | 6 |

Effect of source tampering in the security of quantum cryptography | 6 |

Erratum: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw (Physical Review A - Atomic, Molecular, and Optical Physics (2012) 85 (042307)) | 11 |

Random bipartite entanglement from W and W-like states | 29 |

Insecurity of position-based quantum-cryptography protocols against entanglement attacks | 53 |

Topological approach to Alice electrodynamics | 6 |

Multi-partite quantum cryptographic protocols with noisy ghz states | 16 |

Conference key agreement and quantum sharing of classical secrets with noisy GHZ states | 22 |

Scattering from electroweak strings | 7 |

Universal squash model for optical communications using linear optics and threshold detectors | 171 |

Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels | 70 |

Improve the efficiency of a practical quantum key distribution system | 5 |

Sagnac quantum key distribution using novel polarization-insensitive phase modulators based on frequency shift | 33 |

Quantum key distribution with an unknown and untrusted source | 7 |

How much does it cost to teleport? | 154 |

A Quantum Jump in Security | 5 |

Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states | 13 |

Quantum cryptography with malicious devices | 24 |

Error correction and security in quantum cryptography | 7 |

Security analysis of an untrusted source for quantum key distribution: Passive approach | 7 |

Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks | 23 |

Prefixed-threshold real-time selection method in free-space quantum key distribution | 10 |

Battling with quantum hackers | 21 |

Universal squash model for optical communications using linear optics and threshold detectors | 123 |

Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution | 7 |

Quantum cloning with a broadband optical amplifier | 59 |

Primality test via quantum factorization | 208 |

Machine learning for optimal parameter prediction in quantum key distribution | 22 |

Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber | 4 |

Why quantum bit commitment and ideal quantum coin tossing are impossible | 212 |

Making an Empty Promise with a Quantum Computer | 178 |

Frequency-shifted interferometer and its applications | 22 |

Concentrating entanglement by local actions: Beyond mean values | 10 |

Two-way quantum communication channels | 9 |

High-resolution, large dynamic range fiber length measurement based on a frequency-shifted asymmetric Sagnac interferometer | 8 |

Multi-party agile QKD network with a fiber-based entangled source | 20 |

Security of quantum key distribution with imperfect devices | 9 |

Discrete and continuous variables for measurement-device-independent quantum cryptography | 6 |

Experimental implementation of a three-party quantum key distribution protocol | 10 |

Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses | 45 |

Dual detectors scheme in practical quantum key distribution systems | 13 |

Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite states | 6 |

Reflectometry based on a frequency-shifted interferometer using sideband interference | 7 |

Entanglement monotones for W-type states | 10 |

Polarization insensitive phase modulator for quantum cryptosystems | 13 |

Efficient quantum key distribution | 42 |

Feasibility of quantum key distribution through a dense wavelength division multiplexing network | 11 |

A quantum analog of huffman coding | 7 |

Frequency-shifted Mach-Zehnder interferometer for locating multiple weak reflections along a fiber link | 9 |

Some attacks on quantum-based cryptographic protocols | 6 |

Scalable measurement-device-independent quantum key distribution networks with untrusted relays | 8 |

Decoy state quantum key distribution | 9 |

A simple proof of the unconditional security of quantum key distribution | 14 |

A high-speed quantum random number generator prototype | 29 |

Silicon photonic transmitter for polarization-encoded quantum key distribution | 10 |

Is quantum bit commitment really possible? | 128 |

Quantum cryptography | 37 |

Proof-of-principle experimental demonstration of twin-field quantum key distribution over asymmetric channels | 9 |

Entropic uncertainty relations and the measurement range problem, with consequences for high-dimensional quantum key distribution | 8 |

Fundamental rate-loss trade-off for the quantum internet | 8 |

Simple method for asymmetric twin-field quantum key distribution | 25 |

Postprocessing for quantum random-number generators: Entropy evaluation and randomness extraction | 11 |

Quantum key distribution with dual detectors | 7 |

From quantum cheating to quantum security | 7 |

Non-Abelian vortices and non-Abelian statistics | 9 |

Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw | 229 |

A tight lower bound on the classical communication cost of entanglement dilution | 5 |

Getting something out of nothing | 6 |

Concentrating entanglement by local actions - beyond mean values | 8 |

Experimental demonstration of phase-remapping attack in a practical quantum key distribution system | 9 |

A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution | 61 |

Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment | 7 |

Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors | 10 |

Implementation of two-party protocols in the noisy-storage model | 8 |

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems | 14 |

Phase-remapping attack in practical quantum-key-distribution systems | 13 |

Security proof of a three-state quantum-key-distribution protocol without rotational symmetry | 12 |

Passive preparation of BB84 signal states with coherent light | 9 |

Remote Blind State Preparation with Weak Coherent Pulses in the Field | 19 |

Classical communication cost of entanglement manipulation: Is entanglement an interconvertible resource? | 6 |

A Tight Lower Bound on the Classical Communication Cost of Entanglement Dilution | 7 |

Why quantum bit commitment and quantum coin tossing are impossible? | 105 |

Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution | 18 |

Experimental quantum key distribution with decoy states | 11 |