Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure keys even if users' devices are untrusted. Currently, all DIQKD protocols suffer from the secret key capacity bound, i.e., the secret key rate scales linearly with the transmittance of two users. Here we propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates whereby long-distance entanglement is created by single-photon-type interference. The secret key rate of our scheme can significantly outperform the traditional two-photon-type Bell-state measurement scheme and, importantly, surpass the above capacity bound. Our protocol therefore is an important step towards a realization of DIQKD and can be a promising candidate scheme for entanglement swapping in the future quantum internet.

Download full-text PDF

Source
http://dx.doi.org/10.1364/OL.417851DOI Listing

Publication Analysis

Top Keywords

secret key
12
device-independent quantum
8
quantum key
8
key distribution
8
capacity bound
8
key rate
8
key
5
overcoming rate-distance
4
rate-distance limit
4
limit device-independent
4

Similar Publications

Background: In the contemporary era of rapid digital advancement, information security is closely associated with our daily life. From personal information to state secrets, all domains are intricately linked with information. Consequently, the significance of information security has garnered growing attention from an ever-increasing number of individuals.

View Article and Find Full Text PDF

Background: As future healthcare workers, if medical students can enhance their psychological resilience, it will help them better cope with the pressures and challenges of their future work, thereby improving the overall mental health of healthcare personnel. We aim to identify high-risk individuals among medical students with low psychological resilience and to explore the potential mechanisms for improving psychological resilience.

Methods: We developed an Extreme Gradient Boosting (XGBoost) model using basic characteristics and health behavior information of medical students, and compared its performance with that of Logistic Regression (LR), Decision Tree (DT), and Random Forest (RF) models.

View Article and Find Full Text PDF

Background: Colorectal cancer (CRC) is a highly prevalent and fatal malignancy worldwide. Despite advancements in early screening techniques and treatments, the prognosis for patients remains suboptimal. Studies have shown that metal ions play crucial roles in the occurrence, progression, and treatment of CRC.

View Article and Find Full Text PDF

Centralized version control systems (VCS) are vital for software development but pose risks of data loss and ownership disputes. While blockchain offers a decentralized alternative, existing solutions are often hindered by high latency, compromising the real-time collaboration essential for modern workflows. This study introduces a novel hybrid architecture combining the security of the Ethereum blockchain and the InterPlanetary File System (IPFS) with two key contributions: 1) Shamir's Secret Sharing (SSS) to create a trust-minimized model for key distribution, and 2) an authoritative-first, optimistic-fallback retrieval protocol utilizing a temporary middleware to decouple the user experience from blockchain confirmation delays.

View Article and Find Full Text PDF

Pancreatic ductal adenocarcinoma (PDAC) is a highly aggressive malignancy characterized by poor prognosis, strong resistance to therapy, and a dense immunosuppressive tumor microenvironment (TME). A small subset of cells known as cancer stem cells (CSCs), or tumor-initiating cells (TICs), are increasingly recognized as key contributors to tumor initiation, metastasis, immune evasion, and treatment failure. These cells are defined by their self-renewal capacity, plasticity, and resistance to chemotherapeutic and targeted therapies.

View Article and Find Full Text PDF