Quantum Communication
Theory Group

Our group works on several theoretical aspects of quantum cryptography and quantum communication

This includes closing the gap between theoretical concepts for quantum key distribution (QKD) and their experimental implementation with current photonic technology, the finite-key security analysis of these systems – with special emphasis on the problem of implementation security – , the study of the semi-device-independent and the fully device-independent quantum communication frameworks, the development of high-performance QKD protocols able to increase the secret key rate and maximum distance covered by practical QKD systems, as well as the investigation of beyond-QKD quantum communication schemes, and quantum networks.

Journal papers
  • 1. M. Curty, D. J. Santos, “Quantum authentication of classical messages”, Physical Review A 64, 062309 (2001).

  • 2. M. Curty, D. J. Santos, E. Pérez, P. García-Fernández, “Qubit authentication”, Physical Review A 66, 022301 (2002).

  • 3. E. Pérez, M. Curty, D. J. Santos, P. García-Fernández, “Quantum authentication with unitary coding sets”, Journal of Modern Optics 50, 1035 (2003).

  • 4. M. Curty, N. Lütkenhaus, “Effect of finite detector efficiencies on the security evaluation of quantum key distribution”, Physical Review A 69, 042321 (2004).

  • 5. M. Curty, M. Lewenstein, N. Lütkenhaus, “Entanglement as a Precondition for Secure Quantum Key Distribution”, Physical Review Letters 92, 217903 (2004).

  • 6. J. Eisert, P. Hyllus, O. Gühne, M. Curty, “Complete hierarchies of efficient approximations to problems in entanglement theory”, Physical Review A 70, 062317 (2004).

  • 7. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting two-party quantum correlations in quantum key distribution protocols”, Physical Review A 71, 022306 (2005).

  • 8. M. Curty, N. Lütkenhaus, “Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses”, Physical Review A 71, 062301 (2005).

  • 9. T. Moroder, M. Curty, N. Lütkenhaus, “Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors”, Physical Review A 73, 012311 (2006).

  • 10. E. Andersson,  M. Curty, I. Jex, “Experimentally realizable quantum comparison of coherent states and its applications”, Physical Review A 74, 022304 (2006).

  • 11. T. Moroder, M. Curty, N. Lütkenhaus, “One-way quantum key distribution: Simple upper bound on the secret key rate”, Physical Review A 74, 052301 (2006).

  • 12. M. Curty, L.-L. Zhang, H.-K. Lo, N. Lütkenhaus, “Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states”, Quantum Information and Computation 7, 665 (2007).

  • 13. M. Curty, T. Moroder, “Single-photon quantum key distribution in the presence of loss”, Physical Review A 75, 052336 (2007).

  • 14. M. Curty, N. Lütkenhaus, “Comment on “Arbitrated quantum-signature scheme´´”, Physical Review A 77, 046301 (2008).

  • 15. M. Curty, K. Tamaki, T. Moroder, “Effect of detector dead-times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks”, Physical Review A 77, 052321 (2008).

  • 16. H. Gómez-Sousa, M. Curty, “Upper bounds on the performance of differential-phase-shift quantum key distribution”, Quantum Information and Computation 9, 62 (2009).

  • 17. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds for the secure key rate of decoy-state quantum key distribution”, Physical Review A 79, 032335 (2009).

  • 18. T. Moroder, M. Curty, N. Lütkenhaus, “Detector decoy quantum key distribution”, New Journal of Physics 11, 045008 (2009).

  • 19. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Non-Poissonian statistics from Poissonian Light sources with application to passive decoy state quantum key distribution”, Optics Letters 34, 3238 (2009).

  • 20. M. Curty, X. Ma, B. Qi, T. Moroder, “Passive decoy state quantum key distribution with practical light sources”, Physical Review A 81, 022310 (2010).

  • 21. S. Wehner, M. Curty, C. Schaffner and H.-K. Lo, “How to implement two-party protocols in the noisy-storage model”, Physical Review A 81, 052336 (2010).

  • 22. M. Curty, X. Ma, H. -K. Lo, N. Lütkenhaus, “Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals”, Physical Review A 82, 052325 (2010).

  • 23. M. Curty, X. Ma, H. -K. Lo, N. Lütkenhaus, “Passive preparation of BB84 signal states with coherent light”, Progress in Informatics 8, 57-63 (2011).

  • 24. M. Curty, T. Moroder, “Heralded qubit amplifiers for practical device-independent quantum key distribution”, Physical Review A 84, 010304 (R) (2011).

  • 25. M Jofre, M. Curty, F. Steinlechner, G. Anzolin, J. P. Torres, M. W. Mitchell, V. Pruneri, “True random numbers from amplified quantum vacuum”, Optics Express, Vol. 19, Iss. 21, pp. 20665-20672 (2011).

  • 26. H. -K. Lo, M. Curty, B. Qi, “Measurement device independent quantum key distribution”, Physical Review Letters 108, 130503 (2012).

  • 27. T. Moroder, M. Curty, C. C. W. Lim, L. P. Thinh, H. Zbinden, N. Gisin, “Security of distributed-phase-reference quantum key distribution”, Physical Review Letters 109, 260501 (2012).

  • 28. F. Xu, M. Curty, B. Qi, H.-K. Lo, “Practical aspects of measurement-device-independent quantum key distribution”, New Journal of Physics 15, 113007 (2013).

  • 29. Y. Liu, Y. Cao, M. Curty, S.-K. Liao, J. Wang, K. Cui, Y.-H. Li, Z.-H. Lin, Q.-C. Sun, D.-D. Li, H.-F. Zhang, Y. Zhao, C.-Z. Peng, Q. Zhang, A. Cabello, J.-W. Pan, “Experimental unconditionally secure bit commitment”, Physical Review Letters 112, 010504 (2014).

  • 30. M. Curty, F. Xu, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution”, Nature Communications 5, 3732 (2014).

  • 31. C. Abellán, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, M. W. Mitchell, “Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode”, Optics Express Vol. 22, Iss. 2, pp. 1645–1654 (2014).

  • 32. H.-K. Lo, M. Curty, K. Tamaki, “Secure quantum key distribution”, Nature Photonics 8, 595-604 (2014).

  • 33. C. C. W. Lim, M. Curty, N. Walenta, F. Xu, H. Zbinden, “Concise Security Bounds for Practical Decoy-State Quantum Key Distribution”, Physical Review A 89, 022307 (2014).

  • 34. K. Tamaki, M. Curty, G. Kato, H.-K. Lo, K. Azuma, “Loss-tolerant quantum cryptography with imperfect sources”, Physical Review A 90, 052314 (2014).

  • 35. M. Curty, “Quantum cryptography: know your enemy”, Nature Physics 10, 479-480 (2014).

  • 36. F. Xu, M. Curty, B. Qi, H.-K. Lo, “Measurement-device-independent quantum cryptography”, IEEE Journal of Selected Topics in Quantum Electronics 21, nº 3, 6601111 (2015).

  • 37. M. Curty, M. Jofre, V. Pruneri, M. W. Mitchell, “Passive Decoy-State Quantum Key Distribution with Coherent Light”, Entropy 17, 4064-4082 (2015).

  • 38. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, New Journal of Physics 17, 093011 (2015).

  • 39. F. Xu, M. Curty, B. Qi, L. Qian, H.-K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography”, Nature Photonics 9, 772-773 (2015).

  • 40. P. González, L. Rebón, T. Ferreira da Silva, M. Figueroa, C. Saavedra, M. Curty, G. Lima, G. B. Xavier, W. A. T. Nogueira, “Quantum key distribution with untrusted detectors”, Physical Review A 92, 022337 (2015).

  • 41. K. Tamaki, M. Curty, M. Lucamarini, “Decoy-state quantum key distribution with a leaky source”, New Journal of Physics 18, 065008 (2016).

  • 42. I. V. Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Measurement-device-independent quantum digital signatures”, Physical Review A 94, 022328 (2016).

  • 43. S. Sajeed, A. Huang, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of detector-device-independent quantum key distribution”, Physical Review Letters 117, 250505 (2016).

  • 44. K. Tamaki, H.-K. Lo, A. Mizutani, G. Kato, C. C. W. Lim, K. Azuma, M. Curty, “Security of quantum key distribution with iterative sifting”, Quantum Science and Technology, 3, 014002 (2017).

  • 45. G. L. Roberts, M. Lucamarini, Z. L. Yuan, J. F. Dynes, L. C. Comandar, A. W. Sharpe, A. J. Shields, M. Curty, I. V. Puthoor, E. Andersson, “Experimental measurement-device-independent quantum digital signatures”, Nature Communications 8, 1098 (2017).

  • 46. H.-L. Yin, W.-L. Wang, Y.-L. Tang, Q. Zhao, H. Liu, X.-X. Sun, W.-J. Zhang, H. Li, I. V. Puthoor, L.-X. You, E. Andersson, Z. Wang, Y. Liu, X. Jiang, X. Ma, Q. Zhang, M. Curty, T.-Y. Chen, J.-W. Pan, “Experimental measurement-device-independent quantum digital signatures over a metropolitan network”, Physical Review A 95, 042338 (2017).

  • 47. A. Navarrete, W. Wang, F. Xu, M. Curty, “Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors”, New Journal of Physics 20, 043018 (2018).

  • 48. W. Wang, K. Tamaki, M. Curty, “Finite-key security analysis for quantum key distribution with leaky sources”, New Journal of Physics 20, 083027 (2018).

  • 49. C. Li, M. Curty, F. Xu, O. Bedroya, H.-K. Lo, “Secure quantum communication in the presence of phase and polarization dependent loss”, Physical Review A 98, 042324, (2018).

  • 50. D. Rusca, A. Boaron, M. Curty, A. Martin, H. Zbinden, “Security proof for a simplified BB84-like QKD protocol”, Physical Review A 98, 052336 (2018).

  • 51. A. Mizutani, G. Kato, K. Azuma, M. Curty, R. Ikuta, T. Yamamoto, N. Imoto, H.-K. Lo, K. Tamaki, “Quantum key distribution with setting-choice-independently correlated light sources”, npj Quantum Information 5, 8 (2019).

  • 52. M. Curty, H. K. Lo, “Foiling covert channels and malicious classical post-processing units in quantum key distribution”, npj Quantum Information 5, 14 (2019).

  • 53. F. Grasselli, M. Curty, “Practical decoy-state method for twin-field quantum key distribution”, New Journal of Physics 21, 073001 (2019).

  • 54. M. Pereira, M. Curty, K. Tamaki, “Quantum key distribution with flawed and leaky sources”, npj Quantum Information 5, 62 (2019).

  • 55. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, npj Quantum Information 5, 64 (2019).

  • 56. A. Huang, A. Navarrete, S.-H. Sun, P. Chaiwongkhot, M. Curty, V. Makarov, “Laser seeding attack in quantum key distribution”, Physical Review Applied 12, 064043 (2019).

  • 57. X. Zhong, J. Hu, M. Curty, L. Qian, H.-K. Lo, “Proof-of-principle experimental demonstration of twin-field type quantum key distribution”, Physical Review Letters 123, 100506 (2019).

  • 58. V. Zapatero, M. Curty, “Long-distance device-independent quantum key distribution”, Scientific Reports 9, 17749 (2019).

  • 59. F. Grasselli, A. Navarrete, M. Curty, “Asymmetric twin-field quantum key distribution”, New Journal of Physics 21, 113032 (2019).

  • 60. R. Trényi, K. Azuma, M. Curty, “Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution”, New Journal of Physics 21, 113052 (2019).

  • 61. M. Pereira, G. Kato, A. Mizutani, M. Curty, K. Tamaki, “Quantum key distribution with correlated sources”, Science Advances 6, eaaz4487 (2020).

  • 64. W. Wang, K. Tamaki, M. Curty, “Measurement-Device-Independent Quantum Key Distribution with Leaky Sources”, Scientific Reports 11, 1678 (2021).

  • 63. G. Curras Lorenzo, A. Navarrete, K. Azuma, M. Curty, M. Razavi, “Tight finite-key security for twin-field quantum key distribution”, npj Quantum Information 7, 22 (2021).

  • 62. J. González-Payo, R. Trényi, W. Wang, M. Curty, “Upper security bounds for coherent-one-way quantum key distribution”, Physical Review Letters 125, 260510 (2020).

  • 65. W. Li, V. Zapatero, H. Tan, K. Wei, H. Min, W.-Y. Liu, X. Jiang, S.-K. Liao, C.-Z. Peng, M. Curty, F. Xu, J.-W. Pan, “Experimental quantum key distribution secure against malicious devices”, Phys. Rev. Applied 15, 034081 (2021).

  • 66. V. Zapatero, M. Curty, “Secure quantum key distribution with a subset of malicious devices”, npj Quantum Information 7, 26 (2021).

  • 67. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Practical Quantum Key Distribution Secure Against Side- Channels”, Phys. Rev. Applied 15, 034072 (2021).

  • 68. M. Curty, K. Azuma, H.-K. Lo, “A quantum leap in digital security”, Physics Today 74, 36-41 (2021).

  • 69. R. Trényi, M. Curty, “Zero-error attack against coherent-one-way quantum key distribution”, New Journal of Physics 23, 093005 (2021).

  • 70. V. Zapatero, A. Navarrete, K. Tamaki, M. Curty “Security of quantum key distribution with intensity correlations”, Quantum 5, 602 (2021).

  • 71. M. Curty “Foiling zero-error attacks against coherent-one-way quantum key distribution”, Physical Review A 104, 062417 (2021).

  • 72. G. Currás-Lorenzo, Á. Navarrete, M. Pereira, and K. Tamaki, “Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory”, Phys. Rev. A 104, 012406 (2021)

  • 73. X. Sixto, V. Zapatero, M. Curty, “Security of decoy-state quantum key distribution with correlated intensity fluctuations”, Physical Review Applied 18, 044069 (2022).

  • 74. Á. Navarrete, M. Curty, “Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks”, Quantum Science and Technology 7, 035021 (2022).

  • 75. G. Currás-Lorenzo, S. Nahar, N. Lütkenhaus, K. Tamaki, M. Curty, “Security of quantum key distribution with imperfect phase randomisation”, Quantum Science Technology 9, 015025 (2023).

  • 76. W. Wang, R. Wang, V. Zapatero, L. Qian, B. Qi, M. Curty, H.-K. Lo, “Fully-Passive Quantum Key Distribution”, Physical Review Letters 130, 220801 (2023).

  • 77. V. Zapatero, W. Wang, M. Curty, “A fully passive transmitter for decoy-state quantum key distribution”, Quantum Science and Technology 8, 025014 (2023).

  • 78. V. Zapatero, T. van Leent, R. Arnon-Friedman, W.-Z. Liu, Q. Zhang, H. Weinfurter, M. Curty, “Advances in device-independent quantum key distribution”, npj Quantum Information 9, 10 (2023).

  • 79. M. Pereira, G. Currás-Lorenzo, A. Navarrete, A. Mizutani, G. Kato, M. Curty, K. Tamaki,  “Modified BB84 quantum key distribution protocol robust to source imperfections”, Physical Review Research 5, 023065 (2023).

  • 80. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Secret key rate bounds for quantum key distribution with faulty active phase randomization”, EPJ Quantum Technology 10, 53 (2023).

  • 81. G. Currás-Lorenzo, M. Pereira, G. Kato, M. Curty, K. Tamaki, “A security framework for quantum key distribution implementations”, preprint arXiv:2305.05930 (2023).

  • 82. F.-Y. Lu, Z.-H. Wang, V. Zapatero, J.-L. Chen, S. Wang, Z.-Q. Yin, M. Curty, D.-Y. He, R. Wang, W. Chen, G.-J. Fan-Yuan, G.-C. Guo, Z.-F. Han, “Experimental demonstration of fully passive quantum key distribution”, Physical Review Letters 131, 110802 (2023).

  • 83. V. Zapatero, M. Curty, “Finite-key security of passive quantum key distribution”, Physical Review Applied 21, 014018 (2024).

  • 84. V. Zapatero, A. Navarrete, M. Curty, “Implementation security in quantum key distribution”, Advanced Quantum Technologies 7, 2300380 (2024).

  • 85. J. Rey-Domínguez, A. Navarrete, P. van Loock, M. Curty, “Hacking coherent-one-way quantum key distribution with present-day technology”, Quantum Science and Technology 9, 035044 (2024).
  • 86. M. Pereira, G. Currás-Lorenzo, A. Mizutani, D. Rusca, M. Curty, K. Tamaki, “Quantum key distribution with unbounded pulse correlations”, Quantum Science and Technology 10, 015001 (2025).

  • 87. J.-X. Li, Z.-H. Wang, F.-Y. Lu, V. Zapatero, M. Curty, S. Wang, Z.-Q. Yin, W. Chen, D.-Y. He, G.-C. Guo, Z.-F. Han, “Intensity-correlation-tolerant quantum key distribution”, submitted to Physical Review Letters (2024).

  • 88. V. Mannalath, V. Zapatero, M. Curty, “Sharp finite statistics for minimum data block sizes in quantum key distribution”, preprint arXiv:2410.04095, submitted to Physical Review Letters (2024).

  • 89. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, V. Makarov, “Intensity correlations in decoy-state BB84 quantum key distribution systems”, preprint 2411.00709  (2024).

  • 90. X. Sixto, A. Navarrete, M. Pereira, G. Currás-Lorenzo, K. Tamaki, and M. Curty, “Quantum key distribution with imperfectly isolated devices”, preprint arXiv:2411.13948 (2024).

  • 91. A. Navarrete, V. Zapatero, and M. Curty, “Security of practical modulator-free quantum key distribution”, preprint arXiv:2411.15777 (2024).

  • 92. A. Marcomini, G. Currás-Lorenzo, D. Rusca, A. Valle, K. Tamaki and M. Curty, “Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution”, preprint arXiv:2412.03738 (2024).

  • 93. A. Marcomini, A. Mizutani, F. Grünenfelder, M. Curty, and K. Tamaki, “Loss-tolerant quantum key distribution with detection efficiency mismatch”, preprint arXiv:2412.09684 (2024).

Proceedings
  • 1. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum Correlations for Quantum Key Distribution Protocols”, Proceedings of the Seventh International Conference on Quantum Communication, Measurement and Computing (QCMC) 2004, Vol. 734, pages 307-310. Eds. S. M. Barnett, E. Andersson, J. Jeffers, P. Öhberg, O. Hirota (American Institute of Physics, Melville, New York).

  • 2. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting Quantum Correlations for Quantum Key Distribution”, Proceedings of the Society of Photooptical instrumentation engineers (SPIE) 2005, Vol. 5631, pages 9-19. Eds. G.-C. Guo, H.-K. Lo, M. Sasaki, S. Liu (SPIE, Bellingham (USA).

  • 3. M. Curty, K. Tamaki, T. Moroder, H. Gómez-Sousa, “Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states”, Proceedings of the Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC) 2008, pages 351-354. Eds. A. Lvovsky (American Institute of Physics, Melville, New York).

  • 4. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution”. Proceedings of the 1st International ICST Conference on Quantum Communication and Quantum Networking (Quantum Comm) 2009, Vol. 36, pages 132-141. Eds. A. Sergienko, S. Pascazio, and P. Villoresi (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, ICST, Gent, Belgium).

  • 5. M. Jofre, F. Steinlechner, G. Anzolin, J. P. Torres, M. W. Mitchell, V. Pruneri, M. Curty, “Compact optical sources for quantum communications”, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL’11), Article No. 188, Editorial ACM New York, NY, USA (2011).

  • 6. M. Curty, “Device-Independent Quantum Key Distribution,” in Conference on Lasers and Electro-Optics 2012, OSA Technical Digest (online) (Optica Publishing Group, 2012), paper JTh4K.6.

  • 7. C. Abellán, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, and M. W. Mitchell, “Ultrafast Quantum Random Number Generation Using Off-the-shelf Components,” in CLEO: 2014, OSA Technical Digest (online) (Optica Publishing Group, 2014), paper AW3P.2.

  • 8. M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Proceedings of SPIE, Electro-Optical and Infrared Systems: Technology and Applications XII, and Quantum Information Science and Technology, Vol.9648, 96480X (2015). Eds. D. A. Huckridge, R. Ebert, M. T. Gruneisen, M.Dusek, J. G. Rarity.

  • 9. M. Curty, H.-K. Lo, “Quantum cryptography with malicious devices”, Proceedings of SPIE, Quantum Information Science and Technology IV, Vol.10803, 1080303 (2018). Eds. M. T. Gruneisen, M. Dusek, J. G. Rarity.

  • 10. M. Curty, “Towards high-performance quantum key distribution with implementation security”, Proceedings of SPIE, Advanced Optical Techniques for Quantum Information, Sensing, and Metrology. Vol.11295, 112950D (2020).

Books
  • 1. M. Curty, “Protocolos Cuánticos para la Autenticación de Información en Sistemas de Telecomunicación”, published in the CD-ROM “Teses doutoramento curso 2004/2005” (ISBN: 84-8158-320-0), pages: 1-79 (2006), Servizo de Publicacións da Universidade de Vigo, Spain.

  • 2. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum correlations as basic resource for quantum key distribution” (In the book “Quantum Information Processing”, ISBN 3-527-40541-0, Wiley-VCH Verlag GmbH, Berlin, Germany, 2005), pages 44-57. Eds. T. Beth y G. Leuchs.

  • 3. M. Curty, “Cryptographic Protocols in Optical Communication”, Progress in Modern Optics (ISBN 3-932392-67-1), Vol. 11, pages 1-154 (2006). Eds. S. Malzer, L.J. Wang, P.St.J. Russell, G. Leuchs (Lehrstuhl für Mikrocharakterisierung, Friedrich-Alexander-Universität, Erlangen-Nürnberg, Institute of Optics, Information and Photonics, Max Planck Research Group, Erlangen, Germany).

  • 4. Á. Navarrete, V. Zapatero, M. Curty, “Quantum key distribution protocols” (In the book “Photonic Quantum Technologies”, ISBN 9783527414123, Wiley-VCH Verlag GmbH, 2023), pages 85-103. Ed. M. Benyoucef.

International conferences
  • 1. M. Curty, D. J. Santos, “Protocols for quantum steganography”, II Bielefeld Workshop on Quantum Information Theory and Complexity, Bielefeld, (Germany) 12-14 October 2000.

  • 2. M. Curty, D. J. Santos, “Secure authentication of classical messages with a one-ebit quantum key”, Euroconference QUICK, Quantum Information and Cryptographic keys: novel physics and Advancing Technologies, Cargese, Corcega (France), 7-13 April 2001.

  • 3. M. Curty, D. J. Santos, E. Pérez, P. García-Fernández, “Quantum message authentication”, ERATO workshop on Quantum Information Science 2001 (EQIS’01), Tokio (Japan), 6–8 September 2001.

  • 4. M. Curty, P. van Loock, N. Lütkenhaus, “The security of quantum key distribution and quantum information processing with linear optics”, Kolloquium des DFG-Schwerpunktprogramms Quanteninformationsverarbeitung, Physik-Zentrum in Bad Honnef (Germany), 28-30 January 2002.

  • 5. M. Curty, N. Lütkenhaus, “Intercept-resend attacks on quantum key distribution with weak coherent states”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Osnabrück (Germany), 4-8 March 2002.

  • 6. E. Pérez, M. Curty, D. J. Santos, P. García-Fernández, “Authentication of quantum information”, International Conference on Quantum Information: Conceptual Foundations, Developments and Perspectivas, Oviedo (Spain) 13-18 July 2002.

  • 7. M. Curty, N. Lütkenhaus, “Intercept-resend attacks on quantum key distribution”, International Conference on Quantum Information: Conceptual Foundations, Developments and Perspectivas, Oviedo (Spain) 13-18 July 2002.

  • 8. M. Curty, N. Lütkenhaus, “Characterising two-party correlations for Quantum Key Distribution”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Hannover (Germany), 24-28 March 2003.

  • 9. M. Curty, N. Lütkenhaus, “Characterizing two-party correlations for quantum key distribution”, 4th European Quantum Information Processing and Communication (QIPC) Workshop, Clarendon Laboratory, Oxford (England),13-17 July 2003.

  • 10. M. Curty, M. Lewenstein, N. Lütkenhaus, “Entanglement as precondition for secure quantum key distribution”, Informal Quantum Information Gathering (IQING) Workshop, Max-Planck-Institut für Quantenoptik, Garching (Germany), 2-5 December 2003.

  • 11. M. Curty, M. Lewenstein, N. Lütkenhaus, “Quantum correlations and quantum key distribution”, Latsis Symposium, Quantum Optics for Communication and Computing, Swiss Federal Institute of Technology, Lausanne (EPFL) Switzerland, 1-3 March 2004.

  • 12. M. Curty, N. Lütkenhaus, “Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Munich (Germany), 22-26 March 2004.

  • 13. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting two-party correlations in quantum key distribution protocols”, International Workshop on Quantum Entanglement–from Error Correction to Secure Key Distribution, Hirschegg (Austria), 30 March-2 April 2004.

  • 14. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Necessary conditions for quantum key distribution”, Workshop on Quantum Information Processing with Linear Optics, University Friedrich-Alexander Erlangen-Nürnberg  (Germany), 14–16 April 2004.

  • 15. M. Curty , O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum correlations as a necessary precondition for secure quantum key  distribution”, 5th European Quantum Information Processing and Communication (QIPC) Workshop, University of Rome ‘’La Sapienza’’, Rome (Italy), 20-22 September 2004.

  • 16. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum Correlations for Quantum Key Distribution Protocols”, Seventh International Conference on Quantum Communication, Measurement and Computing QCMC 2004, Glasgow (Scotland), 25-29 July 2004.

  • 17. N. Lütkenhaus, M. Curty, O. Gühne, M. Lewenstein, “Detecting Quantum Correlations for Quantum Key Distribution”, Quantum Optics and Applications in Computing and Communications II, The International Society for Optical Engineering, Beijing (China), 8-12 November 2004

  • 18. O. Gühne, J. Eisert, P. Hyllus, M. Curty, “Complete hierarchies of efficient approximations to problems in entanglement theory”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

  • 19. O. Gühne, M. Curty, M. Lewenstein, N. Lütkenhaus, “Detecting quantum correlations in quantum key distribution protocols”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

  • 20. T. Moroder, M. Curty, N. Lütkenhaus, “Entanglement detection in QKD”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

  • 21. T. Moroder, M. Curty, N. Lütkenhaus, “Upper bound on secret key rate distillable from effective quantum correlations”, Quantum Computation and Information, NATO Advanced Study Institute, Chania, Creta (Greece), 2-13 May 2005.

  • 22. T. Moroder, M. Curty, N. Lütkenhaus  “Upper bound on secret key rate distillable from effective quantum correlations”, Quantum Physics of Nature (QUPON) & 6th European QIPC Workshop, University of Viena, Vienna (Austria), 20-26 May 2005.

  • 23. M. Curty, T. Moroder, N. Lütkenhaus, “Simple upper bounds on the achievable secret key rate in quantum key distribution protocols”, Quantum Information and Quantum Control II at The Fields Institute for Research in Mathematical Science, University of Toronto, Toronto (Canada), 7-11 August 2006.

  • 24. M. Curty, T. Moroder, N. Lütkenhaus, “On one-way and two-way classical post-processing quantum key distribution”, Third Annual Canadian Quantum Information Students’ Conference , University of Calgary, Calgary (Canada), 14–18 August 2006.

  • 25. E. Andersson, M. Curty, I. Jex, “Quantum public key distribution with coherent states”, The 8th International Conference on Quantum Communication, Measurement and Computing, Tsukuba Internacional Congreso Center, Tsukuba (Japan), 28 November-3 December 2006.

  • 26. M. Curty, K. Tamaki, T. Moroder, H.-K. Lo, “Effect of detector dead-time on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks”, International Conference on Quantum Information, Processing and Communication (QIPC 2007), Barcelona, Spain, 15-19 October 2007.

  • 27. M. Curty, T. Moroder, N. Lütkenhaus, “Detector decoy quantum key distribution”, Information Security in a Quantum World workshop, Institute for Quantum Computing, University of Waterloo, Canada, 7-11 August 2008.

  • 28. M. Curty, K. Tamaki, T. Moroder, H. Gómez-Sousa, “Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states”, The Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC 2008), University of Calgary, Canada, 19-24 August 2008.

  • 29. T. Moroder, M. Curty, N. Lütkenhaus, “Detector decoy quantum key distribution”, XII International Conference on Quantum Optics and Quantum Information, Vilnius, Lithuania, 20-23 September 2008.

  • 30. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds on the performance of decoy state quantum key distribution”, 4th Workshop on Theory of Quantum Computation, Communication and Cryptography, Institute for Quantum Computing, University of Waterloo (Canada),11-13 May 2009.

  • 31. M. Curty, T. Moroder, N. Lütkenhaus, “A detector decoy method for practical quantum key distribution”, Internacional Conference on Quantum Information Processing and Communication (QIPC 2009), Rome (Italy), 21–25 September 2009.

  • 32. M. Curty, “Decoy settings in practical quantum key distribution”, QuantTel-IT Workshop on Quantum Private Telecommunications, Instituto de Telecomunicacoes de Lisboa (University of Lisboa, Portugal), 21st October 2009.

  • 33. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution”, 1st International ICST Conference on Quantum Communication and Quantum Networking (QuantumComm) 2009, Vico Equense, Península de Sorrento, Napoles (Italy), 26-30 October 2009.

  • 34. M. Curty, X. Ma, B. Qi, T. Moroder, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution with Coherent Light”, Optical Fiber Communication Conference and Exposition (OFC) and the National Fiber Optic Engineers Conference (NFOEC), Symposium on Quantum Communications, San Diego Convention Center, San Diego (USA), 21–25 March 2010.

  • 35. M. Curty, “Implementation of two-party protocols in the noisy-storage model with decoy states”, Workshop on Cryptography from Storage Imperfections, Institute for Quantum Information, Caltech (USA), 20–22 March 2010.

  • 36. M. Curty, X. Ma, B. Qi, T. Moroder, N. Lütkenhaus, “On decoy-state quantum key distribution with coherent pulses”, Workshop on theory and Realization of Practual Quantum key Distribution, Institute for Quantum Computing, Waterloo (Canada), 14-17 June 2010.

  • 37. M. Curty, X. Ma, H.-K. Lo, N. Lütkenhaus, “Passive sources for quantum key distribution”, Updating Quantum Cryptography and Communications 2010 (UQCC 2010), Ana Iternational Tokyo, Tokyo (Japan), 18-20 October 2010.

  • 38. M. Curty, X. Ma, H.-K. Lo, N. Lütkenhaus, “Passive preparation of BB84 signal states in quantum key distribution”, 2nd Iternational Conference on Quantum Information and Technology (ICQIT), National Institute of Informatics, Tokyo (Japan), 21-22 October 2010.

  • 39. T. Moroder, M. Curty, “Performance of heralded qubit amplifiers for practical device-independent quantum key distribution”,Sixth Conference on the Theory of Quantum Computation, Communication and Cryptography, Madrid, (Spain) 24-26 May 2011.

  • 40. M. Curty, T. Moroder, “Performance of heralded qubit amplifiers for practical device-independent quantum key distribution”, International Conference on Quantum Information and Communication (QIPC2011), Zurich (Switzerland), 5-9 September 2011.

  • 41. M. Curty, T. Moroder, “Heralded qubit amplifiers for device-independent quantum key distribution”, QCRYPT 2011: First Annual Conference on Quantum Cryptography, Zurich (Switzerland), 12-16 September 2011.

  • 42. M Jofre, F. Steinlechner, G. Anzolin, M. Curty, J. P. Torres, M. W. Mitchell, V. Pruneri, “Compact Optical Sources for Quantum Comunications”, 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona (Spain), 26-29 October 2011.

  • 43. M. Curty, “Device-independent quantum key distribution”, Conference on Lasers and Eletro-Optics CLEO:2012 (Symposium ‘Exploring the quantum frontiers of communications’), San Jose Convention Center, San Jose, CA (EEUU), 6–11 mayo de 2012.

  • 44. T. Moroder, M. Curty, C. C. W. Lim, L. P. Thinh, H. Zbinden and N. Gisin, “Security of distributed-phase-reference quantum key distribution”, 2nd Annual Conference on Quantum Cryptography, Singapore, 10–14 September 2012.

  • 45. H.-K. Lo, M. Curty, and  B. Qi, “Measurement-device-independent quantum key distribution protocol with weak coherent sources”, Quantum-Physics-Based Information Security Conference, SPIE Security+Defense, Edinburgh, UK, 24–27 September 2012.

  • 46. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Practical Measurement Device Independent Quantum Key Distribution”, The Tenth Rochester Conferences on Coherence and Quantum Optics (CQO-X) and The Second Quantum Information and Measurement (QIM) Meeting, University of Rochester, Rochester, NY, USA, 17-20 June 2013.

  • 47. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Practical measurement device independent quantum key distribution”, 3rd annual conference on quantum cryptography, Institute for Quantum Computing, University of Waterloo, Waterloo, Canada, 5–9 August 2013.

  • 48. M. Curty, “What theorists should know when working with experimentalists”, 3rd annual conference on quantum cryptography, Institute for Quantum Computing, University of Waterloo, Waterloo, Canada, 5–9 August 2013.

  • 49. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Measurement Device Independent Quantum Key Distribution in a Practical Setting”, Conference on Quantum Information and Quantum Control, The Fields Institute for research in Mathematical Sciences, Toronto, Canada, 12-16 August 2013.

  • 50. C. Abellan, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, M. W. Mitchell, “Ultrafast Quantum Random Number Generation Using Off-the-shelf Components”, Conference on Lasers and Eletro-Optics CLEO:2014 (Symposium ‘Applications and Technology – Novel Optical Devices’), San Jose Convention Center, San Jose, CA (EEUU), 8–13 Junio de 2014.

  • 51. J. González-Payo, F. J. Fraile-Peláez, M. Curty, “Sequential attacks against coherent one-way quantum key distribution”, 4th international conference on quantum cryptography, Telecom ParisTech, Paris, France, 1–5 September 2014.

  • 52. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, 5th annual conference on quantum cryptography (QCRYPT2015), Tokyo, Japan, 28 September-2 October 2015.

  • 53. M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Quantum Information Science and Technology Conference, SPIE  Security+Defense, Toulouse, France, 21-24 September 2015.M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Quantum Information Science and Technology Conference, SPIESecurity+Defense, Toulouse, France, 21-24 September 2015.

  • 54. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, The 34th Quantum Information Technology Symposium, Kochi University of Technology, Japan, 30-31 May 2016.

  • 55. M. Curty, “Quantum Cryptography with Leaky Sources”, International workshop on Trustworthy Quantum Information, Shanghai Institute for Advanced Studies, Shanghai, China, June 27-July 1 2016.

  • 56. M. Curty, K. Tamaki, M. Lucamarini, “Quantum key distribution with leaky devices”, International Conference on Quantum Communication, Measurement and Computing (QCMC), Centre for Quantum Technologies (CQT), National University of Singapore, Singapore, 4-8 July, 2016.

  • 57. I. Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Measurement-Device-Independent Quantum Digital Signatures”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

  • 58. A. Huang, S. Sajeed, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of Detector-Device-independent Quantum Key Distribution”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

  • 59. A. Mizutani, Y. Nagamatsu, M. Curty, H.-K. Lo, K. Azuma, R. Ikuta, T. Yamamoto, N. Imoto, K. Tamaki, “Towards Secure QKD with Testable Assumptions on Modulation Devices”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

  • 60. A. Navarrete-Rodriguez, F. Xu, M. Curty, “Characterising multi-photon quantum interference with decoy-state techniques”, 11th conference on the theory of quantum computation, communication, and cryptography (TQC2016), Berlin, Germany, 27-29 September 2016.

  • 61. W. Wang, M. Curty, “Measurement-device-independent quantum key distribution with leaky sources”, 11th conference on the theory of quantum computation, communication, and cryptography (TQC2016), Berlin, Germany, 27-29 September 2016.

  • 62. A. Mizutani, M. Curty, H.-K. Lo, R. Ikuta, K. Azuma, T. Yamamoto, N. Imoto, G. Kato, K. Tamaki, “Towards secure QKD with testable assumptions on modulation devices”, The 35th Quantum Information Technology Symposium (QIT35), High Energy Accelerator Research Organization (KEK), Tsukuba Campus, Tsukuba, Japan, 24-25 November 2016.

  • 63. M. Curty, H.-K. Lo, “Quantum key distribution secure against partly malicious devices”, Quantum Information and Measurement (QIM)-IV: Quantum Technologies, Universite Pierre et Marie Curie, Paris, France, 5-7 April 2017.

  • 64. S Sajeed, A. Huang, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of detector-device-independent quantum key distribution”, 6th International Conference on New Frontiers in Physics (ICNFP2017), Orthodox Academy of Crete, Crete, Greece, 17-29 August 2017.

  • 65. M. Curty, ”Relaxing the security assumptions of quantum key distribution”, Conference on Quantum Information and Quantum Control VII (CQIQC-VII), The Fields Institute, Toronto, Canada, 28 August-1 September 2017.

  • 66. M. Curty, “Quantum key distribution with relaxed assumptions”, II Quantalab workshop, INL, Braga, Portugal, 12-13 September 2017.

  • 67. A. Navarrete, W. Wang, F. Xu, M. Curty, “Characterising linear optical networks with decoy-state techniques”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

  • 68. W. Wang, M. Curty, “Finite-key Security Analysis of Quantum Key Distribution with Information Leakage”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

  • 69. G. L. Roberts, M. Lucamarini, Z. Yuan, J. Dynes, L. Comandar, A. W. Sharpe, A. Shields, M. Curty, I. V. Puthoor, E. Andersson, “Reconfigurable network for quantum digital signatures mediated by measurement-device-independent quantum key distribution”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

  • 70. M. Curty, “Towards implementation security of quantum key distribution”, 14th International Conference on Quantum Communication, Measurement and Computing (QCMC), Baton Rouge, Louisiana State University, USA, 12-16 March, 2018.

  • 71. M. Pereira, M. Curty, K. Tamaki, “Loss-tolerant quantum cryptography with leaky sources”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 72. V. Castrillo, M. Curty, “Performance evaluation of practical device-independent quantum key distribution”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 73. W. Wang, M. Curty, “Finite-key security analysis of measurement-device-independent quantum key distribution with leaky sources”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 74. C. Li, M. Curty, F. Xu, O. Bedroya, H.-K. Lo, “Post-selection technique against phase and polarization dependent loss in quantum communication”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 75. A. Huang, A. Navarrete, R. Li, V. Egorov, S.-H. Sun, P. Chaiwongkhot, M. Curty, V. Makarov, “Eve strikes back in the era of measurement-device-independent quantum key distribution”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 76. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

  • 77. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, Quantum Technology International Conference 2018 (QTech2018), Paris, France, 5-7 September 2018.

  • 78. M. Pereira, M. Curty, K. Tamaki, “Quantum key distribution with flawed and leaky sources”, COST Nanoscale Quantum Optics Workshop, Portugal, 6-7 Sep 2018

  • 79. M. Curty, H.-K. Lo, “Quantum cryptography with malicious devices”, Quantum Technologies and Quantum Information Science, SPIE Security + Defense, ESTREL Congress Centre, Berlin, Germany, 10-12 September 2018.

  • 80. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, the 40th Quantum Information Technology Symposium (QIT40), Kyushu University, Japan, 20-21 May 2019.

  • 81. M. Curty, “Towards quantum key distribution with implementation security”, 21st International Conference on Transparent Optical Networks, Angers (France), 9-13 July 2019.

  • 82. M. Pereira, M. Curty, K. Tamaki, “Finite-key security analysis of quantum key distribution with flawed and leaky sources ”, 9th International Conference on Quantum Cryptography (QCRYPT2019), Canada, 26-30 Aug 2019

  • 83. F. Grasselli, A. Navarrete, M. Curty, H. Kampermann, D. Bruss, “Bipartite and multipartite QKD via single-photon interference”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 84. R. Trényi, K. Azuma, M. Curty, “Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 85. V. Zapatero, M. Curty, “Secure quantum key distribution with dishonest devices”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 86. M. Pereira, M. Curty, K. Tamaki, “Finite-key security analysis of quantum key distribution with flawed and leaky sources”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 87. G. Currás Lorenzo, M. Curty, K. Azuma, M. Razavi, “Finite-key security analysis of a simple twin-field quantum key distribution protocol”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 88. H.-K. Lo, M. Curty, “Quantum key distribution secure against malicious optical devices and classical post-processing units”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 89. X. Zhong, J. Hu, M. Curty, L. Qian, H.-K. Lo, “Proof-of-principle experimental demonstration of twin-field type quantum key distribution”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

  • 90. V. Zapatero, M. Curty, “QKD secure against malicious providers”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 91. M. Pereira, M. Curty, K. Tamaki, “Implementation security of QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 92. I. Vergheese Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Quantum signatures using measurement-device-independent scheme”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 93. R. Trenyi, K. Azuma, M Curty, “Beating the repeaterless bound with adaptive measurement-device-independent QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 94. F. Grasselli, A. Navarrete, M Curty, “Asymmetric twin-field QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 95. G. Currás Lorenzo, M. Curty, K. Azuma, A. Navarrete, M. Razavi, “Tight finite-key security for twin-field QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

  • 96. M. Curty, “Towards high-performance quantum key distribution with implementation security”, SPIE Photonics West Opto, Advanced Optical Techniques for Quantum Information, Sensing, and Metrology, The Moscone Center, San Francisco, California (USA), 1-6 February 2020.

  • 97. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Practical quantum key distribution secure against side channels”, Security Proofs in QKD Workshop, Canada (Online event), 15-17 Jul 2020

  • 98. M. Pereira, G. Kato, A. Mizutani, M. Curty, K. Tamaki, “Quantum key distribution with correlated sources”, 10th international conference on quantum cryptography (QCRYPT2020), Amsterdam, Netherlands, 10-14 August 2020.

  • 99. V. Zapatero, W. Li, F. Xu, M. Curty, “Experimental quantum key distribution secure against malicious devices”, 10th international conference on quantum cryptography (QCRYPT2020), Amsterdam, Netherlands, 10-14 August 2020.

  • 100. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Bridging the gap between theory and practice of quantum key distribution”, QCALL Final Symposium on Advances in Quantum Communications, England (Online event), 15-17 Jul 2021

  • 101. V. Zapatero, A. Navarrete, M. Curty, K. Tamaki, “Secure quantum key distribution with intensity correlations”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

  • 102. R. Trényi, M. Curty, “The asymptotic performance of coherent-one-way quantum key distribution”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

  • 103. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Practical Quantum Key Distribution Secure Against Side Channels”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

  • 104. W. Wang, R. Wang, V. Zapatero, L. Qian, B. Qi, M. Curty, H.-K. Lo, “Fully-Passive Quantum Key Distribution”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

  • 105. Á. Navarrete, M. Curty, “Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

  • 106. X. Sixto, V. Zapatero, Á. Navarrete, M. Curty, “Security of decoy-state quantum key distribution with correlated intensity fluctuations”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

  • 107. M. Pereira, G. Curras-Lorenzo, A. Navarrete, G. Kato, M. Curty, K. Tamaki, “Modified BB84 quantum key distribution protocol robust against side channels”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

  • 108. V. Zapatero, M. Curty, W. Wang, H.-K. Lo, “Passive decoy-state quantum key distribution”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

  • 109. A. Abad, P. Pintó, F. Cuervo, A. Álvaro, L. Pascual, J.C. Gil, V. Gaspar, J. Autrán, L.F. Vicente, M. Reyes, L. Trigo, V. Pruneri, D. Domingo, M. Irene, A. Álvarez-Herrero, T. Belenger, V. Fernández, P. Arteaga-Díaz, D. Cano, J. Sanz, C. Miravet, P. Campo, J. Bermejo, M. Curty, V. Martín, J.P. Brito, L. Ortíz, “Quantum key distribution from a Geo satellite: Hispasat’s Caramuel system feasibility study”, 27th Ka and 39th ICSSC Joint Conference, Stresa, Italy, 18-21 October 2022.

  • 110. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, and V. Makarov, “Intersymbol intensity correlations in BB84 decoy-state QKD systems”, QUANTA International Symposium on Quantum Science and Technology (QiQ 2023), Changsha, China, 01-03 July (2023).

  • 111. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, and V. Makarov, “Intersymbol intensity correlations in BB84 decoy-state QKD systems”, 2023 International Workshop on Quantum Information, Zhangjiajie, China, 04-08 July (2023).

  • 112. M. Curty, “It’s the security, stupid!”, First International Workshop on Quantum Ecology, Leysin (Switzerland), 5-7 July 2023.

  • 113. V. Zapatero, W. Wang, L. Qian, B. Qi, H.-K. Lo, M. Curty, “Fully passive state preparation in quantum cryptography ”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.

  • 114. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Improved security bounds for quantum key distribution with non-uniform phase randomization”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.

  • 115. Á. Navarrete, M. Curty, “Tight Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.

  • 116. A. Marcomini, G. Currás-Lorenzo, D. Rusca, M. Curty, “Characterising higher-order phase correlations in gain-switched laser sources with application to decoy-state QKD”, 13th international conference on quantum cryptography (QCRYPT2023), University of Maryland, USA, 14 August–18 August 2023.

  • 117. G. Currás-Lorenzo, X. Sixto, K. Tamaki, M. Curty, “Security of quantum key distribution with imperfect phase randomisation”, 13th international conference on quantum cryptography (QCRYPT2023), University of Maryland, USA, 14 August–18 August 2023.

  • 118. M. Curty, “Approaches to achieve implementation security in quantum key distribution and their challenges”, Workshop on Gaussian and non-Gaussian Quantum Correlations, Copenhagen, Denmark, 18-20 December (2023).

  • 119. M. Pereira, G. Currás-Lorenzo, A. Mizutani, D. Rusca, M. Curty, K. Tamaki, “Quantum key distribution with unbounded pulse correlations”, QSNP Workshop on Advancing QKD from theory to technology, Padova, Italy, 6-7 February (2024).

  • 120. M. Pereira, “Security of QKD with pulse correlations”, Workshop on Quantum communication networks, Aveiro, Portugal, 26-27 February (2024).

  • 121. G. Currás-Lorenzo, “Implementation security in quantum key distribution”, Invited tutorial at the Quantum Cryptography and Quantum Networks workshop, organized by the Cluster of Excellence MATH+ and the Einstein Foundation Berlin, Harnack House (Berlin, Germany), 13-14 May 2024.

  • 122. M. Pereira, G. Currás-Lorenzo, A. Mizutani, D. Rusca, M. Curty, K. Tamaki, “Quantum key distribution with unbounded pulse correlations”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 123. G. Currás-Lorenzo, M. Pereira, G. Kato, M. Curty, K. Tamaki, “A security framework for quantum key distribution implementations”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 124. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, V. Makarov, “Intensity correlations in decoy-state BB84 QKD systems”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 125. A. Agulleiro, F. Grünenfelder, M. Pereira, G. Currás-Lorenzo, H. Zbinden, M. Curty, D. Rusca, “Modelling and characterization of pulse correlations for quantum key distribution”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 126. A. Marcomini, Fadri Grünenfelder, G. Currás-Lorenzo, A. Valle, K. Tamaki, H. Zbinden, M. Curty, D. Rusca, “Experimental characterisation of second-order phase correlations in gain-switched laser sources for decoy-state QKD”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 127. X. Sixto, Á. Navarrete, M. Pereira, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Security of decoy-state quantum key distribution with information leakage”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.
  • 128. Á. Navarrete, V. Zapatero, M. Curty, “Impact of information leakage in modulator-free quantum key distribution transmitters”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 129. V. Mannalath, V. Zapatero, M. Curty, “Quantum key distribution with small data block sizes”, 14th international conference on quantum cryptography (QCRYPT2024), Vigo, Spain, 2-6 September 2024.

  • 130. M. Curty, “Introduction to Quantum Key Distribution: From Theory to Experiments and Back”, International School and Symposium on Nanodevices and quanTum Technologies (ISNTT2024), NTT Atsugi R&D center, Japan, December 2 to 6, 2024.

  • 131. M. Curty, “Advances and Challenges in Quantum Key Distribution”, International School and Symposium on Nanodevices and quanTum Technologies (ISNTT2024), NTT Atsugi R&D center, Japan, December 2 to 6, 2024.

National conferences
  • 1. M. Curty, D. J. Santos, “Uso de Técnicas Cuánticas en Esteganografía”, XVI simposium de la URSI (2001), European University of Madrid-CEES, Madrid (Spain), 19-21 September 2001.

  • 2. M. Curty, M. Pérez, D. J. Santos, “Distribución Cuántica de clave en el protocolo BB84”, XVII simposium de la URSI (2002), University of Alcalá, Madrid (Spain), 1-13 September 2002.

  • 3. P. García-Fernández, E. Fernández-Martínez, E. Pérez, M. Pérez-Suárez, M. Curty, D. J. Santos, “Mecanismos cuánticos para la autentificación de información”, XXIX Reunión Bienal de la Real Sociedad Española de Física, Madrid (Spain), 7-11 July 2003.

  • 4. M. Curty, M. Pérez, D. J. Santos, “Información Cuántica: Una panorámica de características y aplicaciones”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

  • 5. M. Curty, M. Pérez, D. J. Santos, “La Mecánica Cuántica como una teoría de la información”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

  • 6. M. Curty, M. Pérez, D. J. Santos, “Sistemas cuánticos de comunicaciones para distribución de claves criptográficas”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

  • 7. M. Curty, “Procesado Cuántico de la información: Aplicación en Computación y Criptografía”, NeoCom 2007, E.T.S. Ingeniería de Telecomunicación, Centro Politécnico Superior, University of Zaragoza (Spain), 28 March 2007.

  • 8. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds for the security of decoy state quantum key distribution with weak coherent pulses”, XXXII Reunión Bienal de la Real Sociedad Española de Física, University of Castilla-La Mancha, Ciudad Real (Spain), 7-11 September 2009.

  • 9. M. Curty, “Sistemas cuánticos de distribución de clave basados en pulsos de luz coherente atenuados”, IX Reunión Nacional de Óptica, Orense (Spain), 14-17 September 2009.

  • 10. M. Curty, “Quantum Cryptography: Closing the security gap between theory and practice”, Workshop in Honor of Prof. Claude Cohen-Tannoudji (Nobel Prize in Physics in 1997), Santiago de Compostela (Spain), 28 May 2015.

  • 11. M. Curty, “Secure Communications using Quantum Cryptography”, XI Reunión Nacional de Óptica, Salamanca (Spain), 1-4 September 2015.

  • 12. M. Curty, “Towards implementation security in quantum cryptography”, 5th Conference on Quantum Information in Spain (ICE-5), Barcelona, Spain, 28-31 May 2019.

  • 13. A. Navarrete, F. Grasselli, M. Curty, “Asymmetric decoy-state estimation for twin-field quantum key distribution”, XXXVII Reunión Bienal de la Real Sociedad Española de Física, University of Zaragoza, Zaragoza (Spain), 15-19 July 2019.

  • 14. V. Zapatero, M. Curty, “Quantum key distribution secure against malicious providers”, XXXVII Reunión Bienal de la Real Sociedad Española de Física, University of Zaragoza, Zaragoza (Spain), 15-19 July 2019.

  • 15. M. Curty, “Breaking the limits of quantum cryptography”, I Workshop Quantum Computers and High Performance Computing, University of Santiago de Compostela, Santiago de Compostela (Spain), 27 November 2019.

  • 16. V. Zapatero, M. Curty, “Simple and passive quantum key distribution”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

  • 17. A. Navarrete, M. Curty, “Decoy-State Quantum Key Distribution Secure Against Trojan-Horse Attacks”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

  • 18. X. Sixto, V. Zapatero, A. Navarrete, M. Curty, “Quantum cryptography with intensity correlations”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

  • 19. A. Navarrete, M. Curty, “Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

  • 20. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Enhanced security bounds for quantum cryptography with arbitrary phase randomization”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

  • 21. V. Zapatero, W. Wang, L. Qian, B. Qi, H.-K. Lo, M. Curty, “Fully passive quantum key distribution”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

  • 22. V. Zapatero, M. Curty, “A fully passive approach to quantum key distribution”, Quantum Technologies for Young Researchers Workshop (QTYR23), Madrid, Spain, 4-7 July 2023.

  • 23. V. Mannalath, “Multiparty entanglement routing in quantum networks”, Quantum Technologies for Young Researchers Workshop (QTYR23), Madrid, Spain, 4-7 July (2023).

  • 25. M. Pereira, G. Currás-Lorenzo, A. Mizutani, D. Rusca, M. Curty, K. Tamaki, “Security of QKD with pulse correlations of unbounded length”, Quantum Communications in Europe and QSNP 3rd General Assembly, Barcelona, Spain, 5-6 June (2024).

  • 24. G. Currás-Lorenzo, M. Pereira, G. Kato, M. Curty, and K. Tamaki, “A security framework for QKD implementations”, Quantum Communications in Europe and QSNP 3rd General Assembly, Barcelona, Spain, 5-6 June (2024).

  • 26. G. Currás-Lorenzo, M. Pereira, G. Kato, M. Curty, K. Tamaki, “A security framework for quantum key distribution implementations”, XXXIX Reunión Bienal de la Real Sociedad Española de Física, School of Engineering of Gipuzkoa, San Sebastián (Spain), 15-19 July 2024.

  • 27. X. Sixto, Á. Navarrete, M. Pereira, G. Currás-Lorenzo, M. Curty, “Quantum key distribution with full information leakage”, XXXIX Reunión Bienal de la Real Sociedad Española de Física, School of Engineering of Gipuzkoa, San Sebastián (Spain), 15-19 July 2024.

  • 28. M. Pereira, G. Currás-Lorenzo, A. Mizutani, D. Rusca, M. Curty, K. Tamaki, “Quantum key distribution with unbounded pulse correlations”, XXXIX Reunión Bienal de la Real Sociedad Española de Física, School of Engineering of Gipuzkoa, San Sebastián (Spain), 15-19 July 2024.

  • 29. A. Marcomini, G. Currás-Lorenzo, D. Rusca, M. Curty, “Security of decoy-state QKD with higher-order phase correlations in gain-switched lasers”, XXXIX Reunión Bienal de la Real Sociedad Española de Física, School of Engineering of Gipuzkoa, San Sebastián (Spain), 15-19 July 2024.

  • 30. V. Zapatero, V. Mannalath, M. Curty, “A refined statistical bound for QKD security analyses”, XXXIX Reunión Bienal de la Real Sociedad Española de Física, School of Engineering of Gipuzkoa, San Sebastián (Spain), 15-19 July 2024.

Koji Azuma

NTT Basic Research Laboratories

Go Kato

National Institute of Information and Communications Technology

Hoi-Kwong Lo

University of Hong Kong & University of Toronto

Akihiro Mizutani

Mitsubishi Electric Corporation

Li Qian

University of Toronto

Kiyoshi Tamaki

University of Toyama

Feihu Xu

University of Science and Technology of China

News