Have a personal or library account? Click to login
Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources Cover

Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources

Open Access
|Dec 2025

References

  1. C. H. Bennett, and G. Brassard (1984). “Quantum cryptography: Public key distribution and coin tossing”. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 175–179.
  2. A. K. Ekert (1991). “Quantum cryptography based on Bell’s theorem”. Physical Review Letters, 67: 6, 661–663.
  3. H.-K. Lo, and H. Chau (1999). “Unconditional security of quantum key distribution over arbitrarily long distances”. Science, 283: 5410, 2050–2056.
  4. D. Mayers (1996). “Quantum key distribution and string oblivious transfer in noisy channels”. Advances in Cryptology—CRYPTO’96, 343–357. Heidelberg: Springer.
  5. P. W. Shor, and J. Preskill (2000). “Simple proof of security of the BB84 quantum key distribution protocol”. Physical Review Letter, 85: 2, 441–444.
  6. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden (2002). “Quantum cryptography”. Reviews of Modern Physics, 74: 1, 145–200.
  7. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin (1992). “Experimental quantum cryptography”. Journal. of Cryptology, 5, 3–28.
  8. S.-K. Liao, W.-Q. Cai, W.-Y. Liu, L. Zhang, Y. Li, J.-G. Ren, J. Yin, Q. Shen, Y. Cao, Z.-P. Li, C.-W. Liao, H.-F. Zhang, Y.-J. Han, W.-Y. Zhou, H.-S. Zhong, H.-Z. Lu, Z.-Z. Zhang, X.-L. Chen, J.-Z. Zhang, F.-X. Li, Z.-S. Yuan, and J.-W. Pan (2017). “Satellite-to-ground quantum key distribution”. Nature, 549: 43–47, 2017.
  9. H. K. Lo, X. Ma, and K. Chen (2005). “Decoy state quantum key distribution”. Physical Review Letter, 94, 230504.
  10. X. B. Wang (2005). “Beating the photon-number-splitting attack in practical quantum cryptography”. Physical Review Letter, 94, 230503.
  11. H. K. Lo, M. Curty, and B. Qi (2012). “Measurement-device-independent quantum key distribution”. Physical Review Letter, 108, 130503.
  12. Z.-Q. Yin, C.-H. Fred Fung, X. Ma, C.-M. Zhang, H.-W. Li, Wei Chen, S. Wang, G.-C. Guo, and Z.-F. Han (2013). “Measurement-device-independent quantum key distribution with uncharacterized qubit sources”. Physical Review A, 88: 6, 1–9.
  13. G.-D. Kang, Q.-P. Zhou, and M.-F. Fang (2019). “Measurement-device-independent quantum key distribution with uncharacterized coherent sources”. Quantum Information Processing, 19: 1, 1–18.
  14. K. Boström and T. Felbinger (2002). “Deterministic secure direct communication using entanglement”. Physical Review Letter, 89: 1, 187902.
  15. M. Lucamarini, and S. Mancini (2005). “Secure deterministic communication without entanglement”. Physical Review Letter,94: 14, 140501.
  16. H. Lu, C.-H. Fred Fung, X.-F. Ma, and Q.-Y. Cai (2011). “Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel”. Physical Review. A, 84: 4, 1504–1512.
  17. N. J. Beaudry, M. Lucamarini, S. Mancini, and R. Renner (2013). “Security of two-way quantum key distribution”. Physical Review A, 88: 6, 8617–8626.
  18. C.-H. Fred Fung, X. Ma, H. Chau, and Q.-Y. Cai (2012). “Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol”. Physical Review A, 85: 3, 032308.
  19. G.-D. Kang, Q.-P. Zhou, and M.-F. Fang (2019). “Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs”. International Journal of Quantum Information, 17: 1, 19500102.
  20. M. Lucamarini, A. Cere’, G. D. Giuseppe, S. Mancini, D. Vitali, and P Tombesi (2007). “Two-way protocol for quantum cryptography with imperfect devices”. Open System and Information Dynamics, 14, 169–178.
  21. L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov. (2010). “Hacking commercial quantum cryptography systems by tailored bright illumination”. Nature Photonics, 4: 10, 686–689.
  22. H. Lu, C.-H. F. Fung, and Q.-Y. Cai (2013). “Two-way deterministic quantum key distribution against detectorside-channel attacks”. Physical Review A, 88: 4, 044302.
  23. Y. Ma, Y.-Z. Ma, Z.-Q. Zhou, C.-F. Li, and G.-C. Guo (2021). “One-hour coherent optical storage in an atomic frequency comb memory”. Nature Communications, 12: 1, 2381.
  24. Q.-Y. Cai (2003). “The ping-pong protocol can be attacked without eavesdropping”. Physical Review Letter, 91, 109801.
  25. A. Wójcik (2003). “Eavesdropping on the “ping-pong” quantum communication protocol”. Physical Review Letter, 90: 15: 157901.
  26. R. Koenig, U. Maurer, and R. Renner (2022). “On the power of quantum memory”. IEEE Transactions Information Theory, 51, 2391–2401.
  27. H.-Z. J. Zeng, M. A. P. Nguyen, X. Ai, A. Bennett, A. S. Solntsev, A. Laucht, M. T. L. S. L. Tang, and P. K. Lam, (2022). “Integrated room temperature single-photon source for quantum key distribution”. Optics Letters, 47: 7, 1673–1676.
  28. X.-F. Ma, B. Qi, Y. Zhao, and H.-K. Lo (2025). “Practical decoy state for quantum key distribution”. Physical Review A,72: 1,012326.
  29. A. El Gamal and Y. H. Kim (2011). Network Information Theory, Cambridge: Cambridge University Press.
  30. H.-W. Li, Y.-B. Zhao, Z.-Q. Yin, S. Wang, Z.-F. Han, W-S. Bao, and G.-C. Guo (2009). “Security of decoy states QKD with finite resources against collective attacks”. Optics Communications, 282: 20, 4162–4166.
  31. M. Christandl, R. Koenig, and R. Renner (2008). “Post-selection technique for quantum channels with applications to quantum cryptography”. Physical Review Letter, 102: 2, 020504.
  32. X.-F. Ma, P. Zeng and H.-Y. Zhou (2018). “Phase-matching quantum key distribution”. Physical Review X,8: 3, 0310431.
  33. L. Zhou, J.-P. Lin, Y.-M. Xie, Y.-S. Lu, Y.-M. Jing, H.-L. Yin and Z.-L. Yuan (2023). “Experimental quantum communication overcomes the rate-loss limit without global phase tracking”. Physical Review Letters, 130, 250801.
  34. Z.-R. Zhou, Y.-B. Sheng, P.-H. Niu, L.-G. Yin, G.-L. Long, and L. Hanzo (2019). “Measurement-device-independent quantum secure direct communication”. Science China Physics, Mechanics & Astronomy, 63: 3, 230362.
  35. R. Jozsa, and J. Schlienz (1999). “Distinguishability of states and von Neumann entropy”. Physical Review A, 62, 012301.
DOI: https://doi.org/10.2478/qic-2025-0029 | Journal eISSN: 3106-0544 | Journal ISSN: 1533-7146
Language: English
Page range: 542 - 551
Submitted on: Apr 9, 2025
|
Accepted on: Oct 13, 2025
|
Published on: Dec 31, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2025 Guo-Dong Kang, Li-Jun Zhang, Xiao-Lu Wu, Qing-Ping Zhou, Mao-Fa Fang, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.