#
Quantum Communication

Theory Group

##### Our group works on several theoretical aspects of quantum cryptography and quantum communication

This includes closing the gap between theoretical concepts for quantum key distribution (QKD) and their experimental implementation with current photonic technology, the finite-key security analysis of these systems – with special emphasis on the problem of implementation security – , the study of the semi-device-independent and the fully device-independent quantum communication frameworks, the development of high-performance QKD protocols able to increase the secret key rate and maximum distance covered by practical QKD systems, as well as the investigation of beyond-QKD quantum communication schemes, and quantum networks.

##### Journal papers

82. V. Zapatero, M. Curty, “Finite-key security of passive quantum key distribution”, preprint arXiv:2308.02376, submitted to Physical Review Applied (2023).

81. F.-Y. Lu, Z.-H. Wang, V. Zapatero, J.-L. Chen, S. Wang, Z.-Q. Yin, M. Curty, D.-Y. He, R. Wang, W. Chen, G.-J. Fan-Yuan, G.-C. Guo, Z.-F. Han, “Experimental demonstration of fully passive quantum key distribution”, Physical Review Letters 131, 110802 (2023).

80. G. Currás-Lorenzo, M. Pereira, G. Kato, M. Curty, K. Tamaki, “A security framework for quantum key distribution implementations”, preprint arXiv:2305.05930

79. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Secret key rate bounds for quantum key distribution with non-uniform phase randomization”, submitted to Physical Review Applied (2023).

78. M. Pereira, G. Currás-Lorenzo, A. Navarrete, A. Mizutani, G. Kato, M. Curty, K. Tamaki, “Modified BB84 quantum key distribution protocol robust to source imperfections”, Physical Review Research 5, 023065 (2023).

77. G. Currás-Lorenzo, K. Tamaki, M. Curty, “Security of decoy-state quantum key distribution with imperfect phase randomization”, preprint arXiv:2210.08183, submitted to Physical Review Letters (2022).

76. V. Zapatero, T. van Leent, R. Arnon-Friedman, W.-Z. Liu, Q. Zhang, H. Weinfurter, M. Curty, “Advances in device-independent quantum key distribution”, npj Quantum Information 9, 10 (2023).

75. V. Zapatero, W. Wang, M. Curty, “A fully passive transmitter for decoy-state quantum key distribution”, Quantum Science and Technology 8, 025014 (2023).

74. W. Wang, R. Wang, V. Zapatero, L. Qian, B. Qi, M. Curty, H.-K. Lo, “Fully-Passive Quantum Key Distribution”, Physical Review Letters 130, 220801 (2023).

73. X. Sixto, V. Zapatero, M. Curty, “Security of decoy-state quantum key distribution with correlated intensity fluctuations”, Physical Review Applied 18, 044069 (2022).

72. Á. Navarrete, M. Curty, “Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks”, Quantum Science and Technology 7, 035021 (2022).

71. M. Curty “Foiling zero-error attacks against coherent-one-way quantum key distribution”, Physical Review A 104, 062417 (2021).

70. V. Zapatero, A. Navarrete, K. Tamaki, M. Curty “Security of quantum key distribution with intensity correlations”, Quantum 5, 602 (2021).

69. R. Trényi, M. Curty, “Zero-error attack against coherent-one-way quantum key distribution”, New Journal of Physics 23, 093005 (2021).

68. M. Curty, K. Azuma, H.-K. Lo, “A quantum leap in digital security”, Physics Today 74, 36-41 (2021).

67. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Practical Quantum Key Distribution Secure Against Side- Channels”, Phys. Rev. Applied 15, 034072 (2021).

66. V. Zapatero, M. Curty, “Secure quantum key distribution with a subset of malicious devices”, npj Quantum Information 7, 26 (2021).

65. W. Li, V. Zapatero, H. Tan, K. Wei, H. Min, W.-Y. Liu, X. Jiang, S.-K. Liao, C.-Z. Peng, M. Curty, F. Xu, J.-W. Pan, “Experimental quantum key distribution secure against malicious devices”, Phys. Rev. Applied 15, 034081 (2021).

64. W. Wang, K. Tamaki, M. Curty, “Measurement-Device-Independent Quantum Key Distribution with Leaky Sources”, Scientific Reports 11, 1678 (2021).

63. G. Curras Lorenzo, A. Navarrete, K. Azuma, M. Curty, M. Razavi, “Tight finite-key security for twin-field quantum key distribution”, npj Quantum Information 7, 22 (2021).

62. J. González-Payo, R. Trényi, W. Wang, M. Curty, “Upper security bounds for coherent-one-way quantum key distribution”, Physical Review Letters 125, 260510 (2020).

61. M. Pereira, G. Kato, A. Mizutani, M. Curty, K. Tamaki, “Quantum key distribution with correlated sources”, Science Advances 6, eaaz4487 (2020).

60. R. Trényi, K. Azuma, M. Curty, “Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution”, New Journal of Physics 21, 113052 (2019).

59. F. Grasselli, A. Navarrete, M. Curty, “Asymmetric twin-field quantum key distribution”, New Journal of Physics 21, 113032 (2019).

58. V. Zapatero, M. Curty, “Long-distance device-independent quantum key distribution”, Scientific Reports 9, 17749 (2019).

57. X. Zhong, J. Hu, M. Curty, L. Qian, H.-K. Lo, “Proof-of-principle experimental demonstration of twin-field type quantum key distribution”, Physical Review Letters 123, 100506 (2019).

56. A. Huang, A. Navarrete, S.-H. Sun, P. Chaiwongkhot, M. Curty, V. Makarov, “Laser seeding attack in quantum key distribution”, Physical Review Applied 12, 064043 (2019).

55. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, npj Quantum Information 5, 64 (2019).

54. M. Pereira, M. Curty, K. Tamaki, “Quantum key distribution with flawed and leaky sources”, npj Quantum Information 5, 62 (2019).

53. F. Grasselli, M. Curty, “Practical decoy-state method for twin-field quantum key distribution”, New Journal of Physics 21, 073001 (2019).

52. M. Curty, H. K. Lo, “Foiling covert channels and malicious classical post-processing units in quantum key distribution”, npj Quantum Information 5, 14 (2019).

51. A. Mizutani, G. Kato, K. Azuma, M. Curty, R. Ikuta, T. Yamamoto, N. Imoto, H.-K. Lo, K. Tamaki, “Quantum key distribution with setting-choice-independently correlated light sources”, npj Quantum Information 5, 8 (2019).

50. D. Rusca, A. Boaron, M. Curty, A. Martin, H. Zbinden, “Security proof for a simplified BB84-like QKD protocol”, Physical Review A 98, 052336 (2018).

49. C. Li, M. Curty, F. Xu, O. Bedroya, H.-K. Lo, “Secure quantum communication in the presence of phase and polarization dependent loss”, Physical Review A 98, 042324, (2018).

48. W. Wang, K. Tamaki, M. Curty, “Finite-key security analysis for quantum key distribution with leaky sources”, New Journal of Physics 20, 083027 (2018).

47. A. Navarrete, W. Wang, F. Xu, M. Curty, “Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors”, New Journal of Physics 20, 043018 (2018).

46. H.-L. Yin, W.-L. Wang, Y.-L. Tang, Q. Zhao, H. Liu, X.-X. Sun, W.-J. Zhang, H. Li, I. V. Puthoor, L.-X. You, E. Andersson, Z. Wang, Y. Liu, X. Jiang, X. Ma, Q. Zhang, M. Curty, T.-Y. Chen, J.-W. Pan, “Experimental measurement-device-independent quantum digital signatures over a metropolitan network”, Physical Review A 95, 042338 (2017).

45. G. L. Roberts, M. Lucamarini, Z. L. Yuan, J. F. Dynes, L. C. Comandar, A. W. Sharpe, A. J. Shields, M. Curty, I. V. Puthoor, E. Andersson, “Experimental measurement-device-independent quantum digital signatures”, Nature Communications 8, 1098 (2017).

44. K. Tamaki, H.-K. Lo, A. Mizutani, G. Kato, C. C. W. Lim, K. Azuma, M. Curty, “Security of quantum key distribution with iterative sifting”, Quantum Science and Technology, 3, 014002 (2017).

43. S. Sajeed, A. Huang, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of detector-device-independent quantum key distribution”, Physical Review Letters 117, 250505 (2016).

42. I. V. Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Measurement-device-independent quantum digital signatures”, Physical Review A 94, 022328 (2016).

41. K. Tamaki, M. Curty, M. Lucamarini, “Decoy-state quantum key distribution with a leaky source”, New Journal of Physics 18, 065008 (2016).

40. P. González, L. Rebón, T. Ferreira da Silva, M. Figueroa, C. Saavedra, M. Curty, G. Lima, G. B. Xavier, W. A. T. Nogueira, “Quantum key distribution with untrusted detectors”, Physical Review A 92, 022337 (2015).

39. F. Xu, M. Curty, B. Qi, L. Qian, H.-K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography”, Nature Photonics 9, 772-773 (2015).

38. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, New Journal of Physics 17, 093011 (2015).

37. M. Curty, M. Jofre, V. Pruneri, M. W. Mitchell, “Passive Decoy-State Quantum Key Distribution with Coherent Light”, Entropy 17, 4064-4082 (2015).

36. F. Xu, M. Curty, B. Qi, H.-K. Lo, “Measurement-device-independent quantum cryptography”, IEEE Journal of Selected Topics in Quantum Electronics 21, nº 3, 6601111 (2015).

35. M. Curty, “Quantum cryptography: know your enemy”, Nature Physics 10, 479-480 (2014).

34. K. Tamaki, M. Curty, G. Kato, H.-K. Lo, K. Azuma, “Loss-tolerant quantum cryptography with imperfect sources”, Physical Review A 90, 052314 (2014).

33. C. C. W. Lim, M. Curty, N. Walenta, F. Xu, H. Zbinden, “Concise Security Bounds for Practical Decoy-State Quantum Key Distribution”, Physical Review A 89, 022307 (2014).

32. H.-K. Lo, M. Curty, K. Tamaki, “Secure quantum key distribution”, Nature Photonics 8, 595-604 (2014).

31. C. Abellán, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, M. W. Mitchell, “Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode”, Optics Express Vol. 22, Iss. 2, pp. 1645–1654 (2014).

30. M. Curty, F. Xu, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution”, Nature Communications 5, 3732 (2014).

29. Y. Liu, Y. Cao, M. Curty, S.-K. Liao, J. Wang, K. Cui, Y.-H. Li, Z.-H. Lin, Q.-C. Sun, D.-D. Li, H.-F. Zhang, Y. Zhao, C.-Z. Peng, Q. Zhang, A. Cabello, J.-W. Pan, “Experimental unconditionally secure bit commitment”, Physical Review Letters 112, 010504 (2014).

28. F. Xu, M. Curty, B. Qi, H.-K. Lo, “Practical aspects of measurement-device-independent quantum key distribution”, New Journal of Physics 15, 113007 (2013).

27. T. Moroder, M. Curty, C. C. W. Lim, L. P. Thinh, H. Zbinden, N. Gisin, “Security of distributed-phase-reference quantum key distribution”, Physical Review Letters 109, 260501 (2012).

26. H. -K. Lo, M. Curty, B. Qi, “Measurement device independent quantum key distribution”, Physical Review Letters 108, 130503 (2012).

25. M Jofre, M. Curty, F. Steinlechner, G. Anzolin, J. P. Torres, M. W. Mitchell, V. Pruneri, “True random numbers from amplified quantum vacuum”, Optics Express, Vol. 19, Iss. 21, pp. 20665-20672 (2011).

24. M. Curty, T. Moroder, “Heralded qubit amplifiers for practical device-independent quantum key distribution”, Physical Review A 84, 010304 (R) (2011).

23. M. Curty, X. Ma, H. -K. Lo, N. Lütkenhaus, “Passive preparation of BB84 signal states with coherent light”, Progress in Informatics 8, 57-63 (2011).

22. M. Curty, X. Ma, H. -K. Lo, N. Lütkenhaus, “Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals”, Physical Review A 82, 052325 (2010).

21. S. Wehner, M. Curty, C. Schaffner and H.-K. Lo, “How to implement two-party protocols in the noisy-storage model”, Physical Review A 81, 052336 (2010).

20. M. Curty, X. Ma, B. Qi, T. Moroder, “Passive decoy state quantum key distribution with practical light sources”, Physical Review A 81, 022310 (2010).

19. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Non-Poissonian statistics from Poissonian Light sources with application to passive decoy state quantum key distribution”, Optics Letters 34, 3238 (2009).

18. T. Moroder, M. Curty, N. Lütkenhaus, “Detector decoy quantum key distribution”, New Journal of Physics 11, 045008 (2009).

17. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds for the secure key rate of decoy-state quantum key distribution”, Physical Review A 79, 032335 (2009).

16. H. Gómez-Sousa, M. Curty, “Upper bounds on the performance of differential-phase-shift quantum key distribution”, Quantum Information and Computation 9, 62 (2009).

15. M. Curty, K. Tamaki, T. Moroder, “Effect of detector dead-times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks”, Physical Review A 77, 052321 (2008).

14. M. Curty, N. Lütkenhaus, “Comment on “Arbitrated quantum-signature scheme´´”, Physical Review A 77, 046301 (2008).

13. M. Curty, T. Moroder, “Single-photon quantum key distribution in the presence of loss”, Physical Review A 75, 052336 (2007).

12. M. Curty, L.-L. Zhang, H.-K. Lo, N. Lütkenhaus, “Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states”, Quantum Information and Computation 7, 665 (2007).

11. T. Moroder, M. Curty, N. Lütkenhaus, “One-way quantum key distribution: Simple upper bound on the secret key rate”, Physical Review A 74, 052301 (2006).

10. E. Andersson, M. Curty, I. Jex, “Experimentally realizable quantum comparison of coherent states and its applications”, Physical Review A 74, 022304 (2006).

9. T. Moroder, M. Curty, N. Lütkenhaus, “Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors”, Physical Review A 73, 012311 (2006).

8. M. Curty, N. Lütkenhaus, “Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses”, Physical Review A 71, 062301 (2005).

7. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting two-party quantum correlations in quantum key distribution protocols”, Physical Review A 71, 022306 (2005).

6. J. Eisert, P. Hyllus, O. Gühne, M. Curty, “Complete hierarchies of efficient approximations to problems in entanglement theory”, Physical Review A 70, 062317 (2004).

5. M. Curty, M. Lewenstein, N. Lütkenhaus, “Entanglement as a Precondition for Secure Quantum Key Distribution”, Physical Review Letters 92, 217903 (2004).

4. M. Curty, N. Lütkenhaus, “Effect of finite detector efficiencies on the security evaluation of quantum key distribution”, Physical Review A 69, 042321 (2004).

3. E. Pérez, M. Curty, D. J. Santos, P. García-Fernández, “Quantum authentication with unitary coding sets”, Journal of Modern Optics 50, 1035 (2003).

2. M. Curty, D. J. Santos, E. Pérez, P. García-Fernández, “Qubit authentication”, Physical Review A 66, 022301 (2002).

1. M. Curty, D. J. Santos, “Quantum authentication of classical messages”, Physical Review A 64, 062309 (2001).

##### Proceedings

10. M. Curty, “Towards high-performance quantum key distribution with implementation security”, Proceedings of SPIE, Advanced Optical Techniques for Quantum Information, Sensing, and Metrology. Vol.11295, 112950D (2020).

9. M. Curty, H.-K. Lo, “Quantum cryptography with malicious devices”, Proceedings of SPIE, Quantum Information Science and Technology IV, Vol.10803, 1080303 (2018). Eds. M. T. Gruneisen, M. Dusek, J. G. Rarity.

8. M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Proceedings of SPIE, Electro-Optical and Infrared Systems: Technology and Applications XII, and Quantum Information Science and Technology, Vol.9648, 96480X (2015). Eds. D. A. Huckridge, R. Ebert, M. T. Gruneisen, M.Dusek, J. G. Rarity.

7. C. Abellán, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, and M. W. Mitchell, “Ultrafast Quantum Random Number Generation Using Off-the-shelf Components,” in CLEO: 2014, OSA Technical Digest (online) (Optica Publishing Group, 2014), paper AW3P.2.

6. M. Curty, “Device-Independent Quantum Key Distribution,” in Conference on Lasers and Electro-Optics 2012, OSA Technical Digest (online) (Optica Publishing Group, 2012), paper JTh4K.6.

5. M. Jofre, F. Steinlechner, G. Anzolin, J. P. Torres, M. W. Mitchell, V. Pruneri, M. Curty, “Compact optical sources for quantum communications”, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL’11), Article No. 188, Editorial ACM New York, NY, USA (2011).

4. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution”. Proceedings of the 1st International ICST Conference on Quantum Communication and Quantum Networking (Quantum Comm) 2009, Vol. 36, pages 132-141. Eds. A. Sergienko, S. Pascazio, and P. Villoresi (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, ICST, Gent, Belgium).

3. M. Curty, K. Tamaki, T. Moroder, H. Gómez-Sousa, “Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states”, Proceedings of the Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC) 2008, pages 351-354. Eds. A. Lvovsky (American Institute of Physics, Melville, New York).

2. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting Quantum Correlations for Quantum Key Distribution”, Proceedings of the Society of Photooptical instrumentation engineers (SPIE) 2005, Vol. 5631, pages 9-19. Eds. G.-C. Guo, H.-K. Lo, M. Sasaki, S. Liu (SPIE, Bellingham (USA).

1. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum Correlations for Quantum Key Distribution Protocols”, Proceedings of the Seventh International Conference on Quantum Communication, Measurement and Computing (QCMC) 2004, Vol. 734, pages 307-310. Eds. S. M. Barnett, E. Andersson, J. Jeffers, P. Öhberg, O. Hirota (American Institute of Physics, Melville, New York).

##### Books

4. Á. Navarrete, V. Zapatero, M. Curty, “Quantum key distribution protocols” (In the book “Photonic Quantum Technologies”, ISBN 9783527414123, Wiley-VCH Verlag GmbH, 2023), pages 85-103. Ed. M. Benyoucef.

3. M. Curty, “Cryptographic Protocols in Optical Communication”, Progress in Modern Optics (ISBN 3-932392-67-1), Vol. 11, pages 1-154 (2006). Eds. S. Malzer, L.J. Wang, P.St.J. Russell, G. Leuchs (Lehrstuhl für Mikrocharakterisierung, Friedrich-Alexander-Universität, Erlangen-Nürnberg, Institute of Optics, Information and Photonics, Max Planck Research Group, Erlangen, Germany).

2. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum correlations as basic resource for quantum key distribution” (In the book “Quantum Information Processing”, ISBN 3-527-40541-0, Wiley-VCH Verlag GmbH, Berlin, Germany, 2005), pages 44-57. Eds. T. Beth y G. Leuchs.

1. M. Curty, “Protocolos Cuánticos para la Autenticación de Información en Sistemas de Telecomunicación”, published in the CD-ROM “Teses doutoramento curso 2004/2005” (ISBN: 84-8158-320-0), pages: 1-79 (2006), Servizo de Publicacións da Universidade de Vigo, Spain.

##### International conferences

113. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, and V. Makarov, “Intersymbol intensity correlations in BB84 decoy-state QKD systems”, 2023 International Workshop on Quantum Information, Zhangjiajie, China, 04-08 July (2023).

112. D. Trefilov, X. Sixto, V. Zapatero, A. Huang, M. Curty, and V. Makarov, “Intersymbol intensity correlations in BB84 decoy-state QKD systems”, QUANTA International Symposium on Quantum Science and Technology (QiQ 2023), Changsha, China, 01-03 July (2023).

111. G. Currás-Lorenzo, X. Sixto, K. Tamaki, M. Curty, “Security of quantum key distribution with imperfect phase randomisation”, 13th international conference on quantum cryptography (QCRYPT2023), University of Maryland, USA, 14 August–18 August 2023.

110. A. Marcomini, G. Currás-Lorenzo, D. Rusca, M. Curty, “Characterising higher-order phase correlations in gain-switched laser sources with application to decoy-state QKD”, 13th international conference on quantum cryptography (QCRYPT2023), University of Maryland, USA, 14 August–18 August 2023.

- 109. Á. Navarrete, M. Curty, “Tight Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.
108. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Improved security bounds for quantum key distribution with non-uniform phase randomization”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.

107. V. Zapatero, W. Wang, L. Qian, B. Qi, H.-K. Lo, M. Curty, “Fully passive state preparation in quantum cryptography ”, 18th Theory of Quantum Computation, Communication and Cryptography (TQC) Conference, Aveiro (Portugal), 24-28 July 2023.

- 106. M. Curty, “It’s the security, stupid!”, First International Workshop on Quantum Ecology, Leysin (Switzerland), 5-7 July 2023.
105. A. Abad, P. Pintó, F. Cuervo, A. Álvaro, L. Pascual, J.C. Gil, V. Gaspar, J. Autrán, L.F. Vicente, M. Reyes, L. Trigo, V. Pruneri, D. Domingo, M. Irene, A. Álvarez-Herrero, T. Belenger, V. Fernández, P. Arteaga-Díaz, D. Cano, J. Sanz, C. Miravet, P. Campo, J. Bermejo, M. Curty, V. Martín, J.P. Brito, L. Ortíz, “Quantum key distribution from a Geo satellite: Hispasat’s Caramuel system feasibility study”, 27th Ka and 39th ICSSC Joint Conference, Stresa, Italy, 18-21 October 2022.

104. V. Zapatero, M. Curty, W. Wang, H.-K. Lo, “Passive decoy-state quantum key distribution”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

103. M. Pereira, G. Curras-Lorenzo, A. Navarrete, G. Kato, M. Curty, K. Tamaki, “Modified BB84 quantum key distribution protocol robust against side channels”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

102. X. Sixto, V. Zapatero, Á. Navarrete, M. Curty, “Security of decoy-state quantum key distribution with correlated intensity fluctuations”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

101. Á. Navarrete, M. Curty, “Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

100. W. Wang, R. Wang, V. Zapatero, L. Qian, B. Qi, M. Curty, H.-K. Lo, “Fully-Passive Quantum Key Distribution”, 12th international conference on quantum cryptography (QCRYPT2022), Taipei City, Taiwan, 29 August – 2 September 2022.

99. A. Navarrete, M. Pereira, M. Curty, K. Tamaki, “Practical Quantum Key Distribution Secure Against Side Channels”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

98. V. Zapatero, A. Navarrete, M. Curty, K. Tamaki, “Secure quantum key distribution with intensity correlations”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

97. R. Trényi, M. Curty, “The asymptotic performance of coherent-one-way quantum key distribution”, 11th international conference on quantum cryptography (QCRYPT2021), Amsterdam, Netherlands, 23-27 August 2021.

96. V. Zapatero, W. Li, F. Xu, M. Curty, “Experimental quantum key distribution secure against malicious devices”, 10th international conference on quantum cryptography (QCRYPT2020), Amsterdam, Netherlands, 10-14 August 2020.

95. M. Pereira, G. Kato, A. Mizutani, M. Curty, K. Tamaki, “Quantum key distribution with correlated sources”, 10th international conference on quantum cryptography (QCRYPT2020), Amsterdam, Netherlands, 10-14 August 2020.

94. M. Curty, “Towards high-performance quantum key distribution with implementation security”, SPIE Photonics West Opto, Advanced Optical Techniques for Quantum Information, Sensing, and Metrology, The Moscone Center, San Francisco, California (USA), 1-6 February 2020.

93. G. Currás Lorenzo, M. Curty, K. Azuma, A. Navarrete, M. Razavi, “Tight finite-key security for twin-field QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

92. F. Grasselli, A. Navarrete, M Curty, “Asymmetric twin-field QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

91. R. Trenyi, K. Azuma, M Curty, “Beating the repeaterless bound with adaptive measurement-device-independent QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

90. I. Vergheese Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Quantum signatures using measurement-device-independent scheme”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

89. M. Pereira, M. Curty, K. Tamaki, “Implementation security of QKD”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

88. V. Zapatero, M. Curty, “QKD secure against malicious providers”, QCALL Early-Stage Researchers Conference, Palermo, Italy, 16-19 September 2019.

87. X. Zhong, J. Hu, M. Curty, L. Qian, H.-K. Lo, “Proof-of-principle experimental demonstration of twin-field type quantum key distribution”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

86. H.-K. Lo, M. Curty, “Quantum key distribution secure against malicious optical devices and classical post-processing units”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

85. G. Currás Lorenzo, M. Curty, K. Azuma, M. Razavi, “Finite-key security analysis of a simple twin-field quantum key distribution protocol”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

84. M. Pereira, M. Curty, K. Tamaki, “Finite-key security analysis of quantum key distribution with flawed and leaky sources”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

83. V. Zapatero, M. Curty, “Secure quantum key distribution with dishonest devices”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

82. R. Trényi, K. Azuma, M. Curty, “Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

81. F. Grasselli, A. Navarrete, M. Curty, H. Kampermann, D. Bruss, “Bipartite and multipartite QKD via single-photon interference”, 9th international conference on quantum cryptography (QCRYPT2019), Montreal, Canada, 26-30 August 2019.

80. M. Curty, “Towards quantum key distribution with implementation security”, 21st International Conference on Transparent Optical Networks, Angers (France), 9-13 July 2019.

79. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, the 40th Quantum Information Technology Symposium (QIT40), Kyushu University, Japan, 20-21 May 2019.

78. M. Curty, H.-K. Lo, “Quantum cryptography with malicious devices”, Quantum Technologies and Quantum Information Science, SPIE Security + Defense, ESTREL Congress Centre, Berlin, Germany, 10-12 September 2018.

77. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, Quantum Technology International Conference 2018 (QTech2018), Paris, France, 5-7 September 2018.

76. M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

75. A. Huang, A. Navarrete, R. Li, V. Egorov, S.-H. Sun, P. Chaiwongkhot, M. Curty, V. Makarov, “Eve strikes back in the era of measurement-device-independent quantum key distribution”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

74. C. Li, M. Curty, F. Xu, O. Bedroya, H.-K. Lo, “Post-selection technique against phase and polarization dependent loss in quantum communication”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

73. W. Wang, M. Curty, “Finite-key security analysis of measurement-device-independent quantum key distribution with leaky sources”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

72. V. Castrillo, M. Curty, “Performance evaluation of practical device-independent quantum key distribution”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

71. M. Pereira, M. Curty, K. Tamaki, “Loss-tolerant quantum cryptography with leaky sources”, 8th international conference on quantum cryptography (QCRYPT2018), Shanghai, China, 27-31 August 2018.

70. M. Curty, “Towards implementation security of quantum key distribution”, 14th International Conference on Quantum Communication, Measurement and Computing (QCMC), Baton Rouge, Louisiana State University, USA, 12-16 March, 2018.

69. G. L. Roberts, M. Lucamarini, Z. Yuan, J. Dynes, L. Comandar, A. W. Sharpe, A. Shields, M. Curty, I. V. Puthoor, E. Andersson, “Reconfigurable network for quantum digital signatures mediated by measurement-device-independent quantum key distribution”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

68. W. Wang, M. Curty, “Finite-key Security Analysis of Quantum Key Distribution with Information Leakage”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

67. A. Navarrete, W. Wang, F. Xu, M. Curty, “Characterising linear optical networks with decoy-state techniques”, 7th annual conference on quantum cryptography (QCRYPT2017), Cambridge, UK, 18-22 September 2017.

66. M. Curty, “Quantum key distribution with relaxed assumptions”, II Quantalab workshop, INL, Braga, Portugal, 12-13 September 2017.

65. M. Curty, ”Relaxing the security assumptions of quantum key distribution”, Conference on Quantum Information and Quantum Control VII (CQIQC-VII), The Fields Institute, Toronto, Canada, 28 August-1 September 2017.

64. S Sajeed, A. Huang, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of detector-device-independent quantum key distribution”, 6th International Conference on New Frontiers in Physics (ICNFP2017), Orthodox Academy of Crete, Crete, Greece, 17-29 August 2017.

63. M. Curty, H.-K. Lo, “Quantum key distribution secure against partly malicious devices”, Quantum Information and Measurement (QIM)-IV: Quantum Technologies, Universite Pierre et Marie Curie, Paris, France, 5-7 April 2017.

62. A. Mizutani, M. Curty, H.-K. Lo, R. Ikuta, K. Azuma, T. Yamamoto, N. Imoto, G. Kato, K. Tamaki, “Towards secure QKD with testable assumptions on modulation devices”, The 35th Quantum Information Technology Symposium (QIT35), High Energy Accelerator Research Organization (KEK), Tsukuba Campus, Tsukuba, Japan, 24-25 November 2016.

61. W. Wang, M. Curty, “Measurement-device-independent quantum key distribution with leaky sources”, 11th conference on the theory of quantum computation, communication, and cryptography (TQC2016), Berlin, Germany, 27-29 September 2016.

60. A. Navarrete-Rodriguez, F. Xu, M. Curty, “Characterising multi-photon quantum interference with decoy-state techniques”, 11th conference on the theory of quantum computation, communication, and cryptography (TQC2016), Berlin, Germany, 27-29 September 2016.

59. A. Mizutani, Y. Nagamatsu, M. Curty, H.-K. Lo, K. Azuma, R. Ikuta, T. Yamamoto, N. Imoto, K. Tamaki, “Towards Secure QKD with Testable Assumptions on Modulation Devices”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

58. A. Huang, S. Sajeed, S. Sun, F. Xu, V. Makarov, M. Curty, “Insecurity of Detector-Device-independent Quantum Key Distribution”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

57. I. Puthoor, R. Amiri, P. Wallden, M. Curty, E. Andersson, “Measurement-Device-Independent Quantum Digital Signatures”, 6th annual conference on quantum cryptography (QCRYPT2016), Washington D.C., EEUU, 12-16 septiembre 2016.

56. M. Curty, K. Tamaki, M. Lucamarini, “Quantum key distribution with leaky devices”, International Conference on Quantum Communication, Measurement and Computing (QCMC), Centre for Quantum Technologies (CQT), National University of Singapore, Singapore, 4-8 July, 2016.

55. M. Curty, “Quantum Cryptography with Leaky Sources”, International workshop on Trustworthy Quantum Information, Shanghai Institute for Advanced Studies, Shanghai, China, June 27-July 1 2016.

54. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, The 34th Quantum Information Technology Symposium, Kochi University of Technology, Japan, 30-31 May 2016.

53. M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Quantum Information Science and Technology Conference, SPIE Security+Defense, Toulouse, France, 21-24 September 2015.M. Curty, K. Tamaki, F. Xu, A. Mizutani, C. C. W. Lim, B. Qi, H.-K. Lo, “Bridging the gap between theory and practice in quantum cryptography”, Quantum Information Science and Technology Conference, SPIESecurity+Defense, Toulouse, France, 21-24 September 2015.

52. A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources”, 5th annual conference on quantum cryptography (QCRYPT2015), Tokyo, Japan, 28 September-2 October 2015.

51. J. González-Payo, F. J. Fraile-Peláez, M. Curty, “Sequential attacks against coherent one-way quantum key distribution”, 4th international conference on quantum cryptography, Telecom ParisTech, Paris, France, 1–5 September 2014.

50. C. Abellan, W. Amaya, M. Jofre, M. Curty, A. Acín, J. Capmany, V. Pruneri, M. W. Mitchell, “Ultrafast Quantum Random Number Generation Using Off-the-shelf Components”, Conference on Lasers and Eletro-Optics CLEO:2014 (Symposium ‘Applications and Technology – Novel Optical Devices’), San Jose Convention Center, San Jose, CA (EEUU), 8–13 Junio de 2014.

49. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Measurement Device Independent Quantum Key Distribution in a Practical Setting”, Conference on Quantum Information and Quantum Control, The Fields Institute for research in Mathematical Sciences, Toronto, Canada, 12-16 August 2013.

48. M. Curty, “What theorists should know when working with experimentalists”, 3rd annual conference on quantum cryptography, Institute for Quantum Computing, University of Waterloo, Waterloo, Canada, 5–9 August 2013.

47. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Practical measurement device independent quantum key distribution”, 3rd annual conference on quantum cryptography, Institute for Quantum Computing, University of Waterloo, Waterloo, Canada, 5–9 August 2013.

46. F. Xu, M. Curty, B. Qi, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo, “Practical Measurement Device Independent Quantum Key Distribution”, The Tenth Rochester Conferences on Coherence and Quantum Optics (CQO-X) and The Second Quantum Information and Measurement (QIM) Meeting, University of Rochester, Rochester, NY, USA, 17-20 June 2013.

45. H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution protocol with weak coherent sources”, Quantum-Physics-Based Information Security Conference, SPIE Security+Defense, Edinburgh, UK, 24–27 September 2012.

44. T. Moroder, M. Curty, C. C. W. Lim, L. P. Thinh, H. Zbinden and N. Gisin, “Security of distributed-phase-reference quantum key distribution”, 2nd Annual Conference on Quantum Cryptography, Singapore, 10–14 September 2012.

43. M. Curty, “Device-independent quantum key distribution”, Conference on Lasers and Eletro-Optics CLEO:2012 (Symposium ‘Exploring the quantum frontiers of communications’), San Jose Convention Center, San Jose, CA (EEUU), 6–11 mayo de 2012.

42. M Jofre, F. Steinlechner, G. Anzolin, M. Curty, J. P. Torres, M. W. Mitchell, V. Pruneri, “Compact Optical Sources for Quantum Comunications”, 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona (Spain), 26-29 October 2011.

41. M. Curty, T. Moroder, “Heralded qubit amplifiers for device-independent quantum key distribution”, QCRYPT 2011: First Annual Conference on Quantum Cryptography, Zurich (Switzerland), 12-16 September 2011.

40. M. Curty, T. Moroder, “Performance of heralded qubit amplifiers for practical device-independent quantum key distribution”, International Conference on Quantum Information and Communication (QIPC2011), Zurich (Switzerland), 5-9 September 2011.

39. T. Moroder, M. Curty, “Performance of heralded qubit amplifiers for practical device-independent quantum key distribution”,Sixth Conference on the Theory of Quantum Computation, Communication and Cryptography, Madrid, (Spain) 24-26 May 2011.

38. M. Curty, X. Ma, H.-K. Lo, N. Lütkenhaus, “Passive preparation of BB84 signal states in quantum key distribution”, 2nd Iternational Conference on Quantum Information and Technology (ICQIT), National Institute of Informatics, Tokyo (Japan), 21-22 October 2010.

37. M. Curty, X. Ma, H.-K. Lo, N. Lütkenhaus, “Passive sources for quantum key distribution”, Updating Quantum Cryptography and Communications 2010 (UQCC 2010), Ana Iternational Tokyo, Tokyo (Japan), 18-20 October 2010.

36. M. Curty, X. Ma, B. Qi, T. Moroder, N. Lütkenhaus, “On decoy-state quantum key distribution with coherent pulses”, Workshop on theory and Realization of Practual Quantum key Distribution, Institute for Quantum Computing, Waterloo (Canada), 14-17 June 2010.

35. M. Curty, “Implementation of two-party protocols in the noisy-storage model with decoy states”, Workshop on Cryptography from Storage Imperfections, Institute for Quantum Information, Caltech (USA), 20–22 March 2010.

34. M. Curty, X. Ma, B. Qi, T. Moroder, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution with Coherent Light”, Optical Fiber Communication Conference and Exposition (OFC) and the National Fiber Optic Engineers Conference (NFOEC), Symposium on Quantum Communications, San Diego Convention Center, San Diego (USA), 21–25 March 2010.

33. M. Curty, T. Moroder, X. Ma, N. Lütkenhaus, “Passive Decoy State Quantum Key Distribution”, 1st International ICST Conference on Quantum Communication and Quantum Networking (QuantumComm) 2009, Vico Equense, Península de Sorrento, Napoles (Italy), 26-30 October 2009.

32. M. Curty, “Decoy settings in practical quantum key distribution”, QuantTel-IT Workshop on Quantum Private Telecommunications, Instituto de Telecomunicacoes de Lisboa (University of Lisboa, Portugal), 21st October 2009.

31. M. Curty, T. Moroder, N. Lütkenhaus, “A detector decoy method for practical quantum key distribution”, Internacional Conference on Quantum Information Processing and Communication (QIPC 2009), Rome (Italy), 21–25 September 2009.

30. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds on the performance of decoy state quantum key distribution”, 4th Workshop on Theory of Quantum Computation, Communication and Cryptography, Institute for Quantum Computing, University of Waterloo (Canada),11-13 May 2009.

29. T. Moroder, M. Curty, N. Lütkenhaus, “Detector decoy quantum key distribution”, XII International Conference on Quantum Optics and Quantum Information, Vilnius, Lithuania, 20-23 September 2008.

28. M. Curty, K. Tamaki, T. Moroder, H. Gómez-Sousa, “Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states”, The Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC 2008), University of Calgary, Canada, 19-24 August 2008.

27. M. Curty, T. Moroder, N. Lütkenhaus, “Detector decoy quantum key distribution”, Information Security in a Quantum World workshop, Institute for Quantum Computing, University of Waterloo, Canada, 7-11 August 2008.

26. M. Curty, K. Tamaki, T. Moroder, H.-K. Lo, “Effect of detector dead-time on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks”, International Conference on Quantum Information, Processing and Communication (QIPC 2007), Barcelona, Spain, 15-19 October 2007.

25. E. Andersson, M. Curty, I. Jex, “Quantum public key distribution with coherent states”, The 8th International Conference on Quantum Communication, Measurement and Computing, Tsukuba Internacional Congreso Center, Tsukuba (Japan), 28 November-3 December 2006.

24. M. Curty, T. Moroder, N. Lütkenhaus, “On one-way and two-way classical post-processing quantum key distribution”, Third Annual Canadian Quantum Information Students’ Conference , University of Calgary, Calgary (Canada), 14–18 August 2006.

23. M. Curty, T. Moroder, N. Lütkenhaus, “Simple upper bounds on the achievable secret key rate in quantum key distribution protocols”, Quantum Information and Quantum Control II at The Fields Institute for Research in Mathematical Science, University of Toronto, Toronto (Canada), 7-11 August 2006.

22. T. Moroder, M. Curty, N. Lütkenhaus “Upper bound on secret key rate distillable from effective quantum correlations”, Quantum Physics of Nature (QUPON) & 6th European QIPC Workshop, University of Viena, Vienna (Austria), 20-26 May 2005.

21. T. Moroder, M. Curty, N. Lütkenhaus, “Upper bound on secret key rate distillable from effective quantum correlations”, Quantum Computation and Information, NATO Advanced Study Institute, Chania, Creta (Greece), 2-13 May 2005.

20. T. Moroder, M. Curty, N. Lütkenhaus, “Entanglement detection in QKD”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

19. O. Gühne, M. Curty, M. Lewenstein, N. Lütkenhaus, “Detecting quantum correlations in quantum key distribution protocols”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

18. O. Gühne, J. Eisert, P. Hyllus, M. Curty, “Complete hierarchies of efficient approximations to problems in entanglement theory”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Berlin (Germany), 4–9 March 2005.

17. N. Lütkenhaus, M. Curty, O. Gühne, M. Lewenstein, “Detecting Quantum Correlations for Quantum Key Distribution”, Quantum Optics and Applications in Computing and Communications II, The International Society for Optical Engineering, Beijing (China), 8-12 November 2004

16. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum Correlations for Quantum Key Distribution Protocols”, Seventh International Conference on Quantum Communication, Measurement and Computing QCMC 2004, Glasgow (Scotland), 25-29 July 2004.

15. M. Curty , O. Gühne, M. Lewenstein, N. Lütkenhaus, “Quantum correlations as a necessary precondition for secure quantum key distribution”, 5th European Quantum Information Processing and Communication (QIPC) Workshop, University of Rome ‘’La Sapienza’’, Rome (Italy), 20-22 September 2004.

14. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Necessary conditions for quantum key distribution”, Workshop on Quantum Information Processing with Linear Optics, University Friedrich-Alexander Erlangen-Nürnberg (Germany), 14–16 April 2004.

13. M. Curty, O. Gühne, M. Lewenstein, N. Lütkenhaus, “Detecting two-party correlations in quantum key distribution protocols”, International Workshop on Quantum Entanglement–from Error Correction to Secure Key Distribution, Hirschegg (Austria), 30 March-2 April 2004.

12. M. Curty, N. Lütkenhaus, “Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Munich (Germany), 22-26 March 2004.

11. M. Curty, M. Lewenstein, N. Lütkenhaus, “Quantum correlations and quantum key distribution”, Latsis Symposium, Quantum Optics for Communication and Computing, Swiss Federal Institute of Technology, Lausanne (EPFL) Switzerland, 1-3 March 2004.

10. M. Curty, M. Lewenstein, N. Lütkenhaus, “Entanglement as precondition for secure quantum key distribution”, Informal Quantum Information Gathering (IQING) Workshop, Max-Planck-Institut für Quantenoptik, Garching (Germany), 2-5 December 2003.

9. M. Curty, N. Lütkenhaus, “Characterizing two-party correlations for quantum key distribution”, 4th European Quantum Information Processing and Communication (QIPC) Workshop, Clarendon Laboratory, Oxford (England),13-17 July 2003.

8. M. Curty, N. Lütkenhaus, “Characterising two-party correlations for Quantum Key Distribution”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Hannover (Germany), 24-28 March 2003.

7. M. Curty, N. Lütkenhaus, “Intercept-resend attacks on quantum key distribution”, International Conference on Quantum Information: Conceptual Foundations, Developments and Perspectivas, Oviedo (Spain) 13-18 July 2002.

6. E. Pérez, M. Curty, D. J. Santos, P. García-Fernández, “Authentication of quantum information”, International Conference on Quantum Information: Conceptual Foundations, Developments and Perspectivas, Oviedo (Spain) 13-18 July 2002.

5. M. Curty, N. Lütkenhaus, “Intercept-resend attacks on quantum key distribution with weak coherent states”, Frühjahrstagung des Arbeitskreises Atome, Molecüle, Quantenoptik und Plasmen (AMOP) der DPG, Osnabrück (Germany), 4-8 March 2002.

4. M. Curty, P. van Loock, N. Lütkenhaus, “The security of quantum key distribution and quantum information processing with linear optics”, Kolloquium des DFG-Schwerpunktprogramms Quanteninformationsverarbeitung, Physik-Zentrum in Bad Honnef (Germany), 28-30 January 2002.

3. M. Curty, D. J. Santos, E. Pérez, P. García-Fernández, “Quantum message authentication”, ERATO workshop on Quantum Information Science 2001 (EQIS’01), Tokio (Japan), 6–8 September 2001.

2. M. Curty, D. J. Santos, “Secure authentication of classical messages with a one-ebit quantum key”, Euroconference QUICK, Quantum Information and Cryptographic keys: novel physics and Advancing Technologies, Cargese, Corcega (France), 7-13 April 2001.

1. M. Curty, D. J. Santos, “Protocols for quantum steganography”, II Bielefeld Workshop on Quantum Information Theory and Complexity, Bielefeld, (Germany) 12-14 October 2000.

##### National conferences

22. V. Zapatero, M. Curty, “A fully passive approach to quantum key distribution”, Quantum Technologies for Young Researchers workshop (QTYR23), Madrid, Spain, 4-7 July 2023.

21. V. Zapatero, W. Wang, L. Qian, B. Qi, H.-K. Lo, M. Curty, “Fully passive quantum key distribution”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

20. X. Sixto, G. Currás-Lorenzo, K. Tamaki, M. Curty, “Enhanced security bounds for quantum cryptography with arbitrary phase randomization”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

19. A. Navarrete, M. Curty, “Security Analysis of Decoy-State Quantum Key Distribution Against Trojan-Horse Attacks”, 8th Conference on Quantum Information in Spain (ICE-8), University of Santiago de Compostela, 29 May – 1 June 2023.

18. X. Sixto, V. Zapatero, A. Navarrete, M. Curty, “Quantum cryptography with intensity correlations”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

17. A. Navarrete, M. Curty, “Decoy-State Quantum Key Distribution Secure Against Trojan-Horse Attacks”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

16. V. Zapatero, M. Curty, “Simple and passive quantum key distribution”, XXXVIII Reunión Bienal de la Real Sociedad Española de Física, University of Murcia, Murcia (Spain), 11-15 July 2022.

15. M. Curty, “Breaking the limits of quantum cryptography”, I Workshop Quantum Computers and High Performance Computing, University of Santiago de Compostela, Santiago de Compostela (Spain), 27 November 2019.

14. V. Zapatero, M. Curty, “Quantum key distribution secure against malicious providers”, XXXVII Reunión Bienal de la Real Sociedad Española de Física, University of Zaragoza, Zaragoza (Spain), 15-19 July 2019.

13. A. Navarrete, F. Grasselli, M. Curty, “Asymmetric decoy-state estimation for twin-field quantum key distribution”, XXXVII Reunión Bienal de la Real Sociedad Española de Física, University of Zaragoza, Zaragoza (Spain), 15-19 July 2019.

12. M. Curty, “Towards implementation security in quantum cryptography”, 5th Conference on Quantum Information in Spain (ICE-5), Barcelona, Spain, 28-31 May 2019.

11. M. Curty, “Secure Communications using Quantum Cryptography”, XI Reunión Nacional de Óptica, Salamanca (Spain), 1-4 September 2015.

10. M. Curty, “Quantum Cryptography: Closing the security gap between theory and practice”, Workshop in Honor of Prof. Claude Cohen-Tannoudji (Nobel Prize in Physics in 1997), Santiago de Compostela (Spain), 28 May 2015.

9. M. Curty, “Sistemas cuánticos de distribución de clave basados en pulsos de luz coherente atenuados”, IX Reunión Nacional de Óptica, Orense (Spain), 14-17 September 2009.

8. M. Curty, T. Moroder, X. Ma, H.-K. Lo, N. Lütkenhaus, “Upper bounds for the security of decoy state quantum key distribution with weak coherent pulses”, XXXII Reunión Bienal de la Real Sociedad Española de Física, University of Castilla-La Mancha, Ciudad Real (Spain), 7-11 September 2009.

7. M. Curty, “Procesado Cuántico de la información: Aplicación en Computación y Criptografía”, NeoCom 2007, E.T.S. Ingeniería de Telecomunicación, Centro Politécnico Superior, University of Zaragoza (Spain), 28 March 2007.

6. M. Curty, M. Pérez, D. J. Santos, “Sistemas cuánticos de comunicaciones para distribución de claves criptográficas”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

5. M. Curty, M. Pérez, D. J. Santos, “La Mecánica Cuántica como una teoría de la información”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

4. M. Curty, M. Pérez, D. J. Santos, “Información Cuántica: Una panorámica de características y aplicaciones”, XVIII simposium de la URSI (2003), University of La Coruña, (Spain), 10-12 September 2003.

3. P. García-Fernández, E. Fernández-Martínez, E. Pérez, M. Pérez-Suárez, M. Curty, D. J. Santos, “Mecanismos cuánticos para la autentificación de información”, XXIX Reunión Bienal de la Real Sociedad Española de Física, Madrid (Spain), 7-11 July 2003.

2. M. Curty, M. Pérez, D. J. Santos, “Distribución Cuántica de clave en el protocolo BB84”, XVII simposium de la URSI (2002), University of Alcalá, Madrid (Spain), 1-13 September 2002.

1. M. Curty, D. J. Santos, “Uso de Técnicas Cuánticas en Esteganografía”, XVI simposium de la URSI (2001), European University of Madrid-CEES, Madrid (Spain), 19-21 September 2001.

**Koji Azuma**

NTT Basic Research Laboratories

**Go Kato**

National Institute of Information and Communications Technology

**Hoi-Kwong Lo**

University of Hong Kong & University of Toronto

**Akihiro Mizutani**

Mitsubishi Electric Corporation

**Li Qian**

University of Toronto

**Kiyoshi Tamaki**

University of Toyama

**Feihu Xu**

University of Science and Technology of China

News