Hoi Kwong Lo
#136,638
Most Influential Person Now
Hoi Kwong Lo's AcademicInfluence.com Rankings
Download Badge
Physics
Hoi Kwong Lo's Degrees
- PhD Physics University of Science and Technology of China
- Bachelors Physics University of Science and Technology of China
Why Is Hoi Kwong Lo Influential?
(Suggest an Edit or Addition)Hoi Kwong Lo's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Measurement-device-independent quantum key distribution. (2011) (1344)
- HOW TO SHARE A QUANTUM SECRET (1999) (1184)
- Decoy state quantum key distribution. (2004) (1006)
- Secure quantum key distribution (2014) (899)
- Security of quantum key distribution with imperfect devices (2002) (784)
- Practical Decoy State for Quantum Key Distribution (2005) (753)
- Classical-communication cost in distributed quantum-information processing: A generalization of quantum-communication complexity (1999) (606)
- Is Quantum Bit Commitment Really Possible? (1996) (556)
- Practical challenges in quantum key distribution (2016) (506)
- Introduction to Quantum Computation Information (2002) (488)
- Secure quantum key distribution with realistic devices (2020) (474)
- Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security (2000) (456)
- Insecurity of Quantum Secure Computations (1996) (428)
- All-photonic quantum repeaters (2013) (354)
- Experimental demonstration of time-shift attack against practical quantum key distribution systems (2007) (336)
- Time-shift attack in practical quantum cryptosystems (2005) (289)
- Experimental quantum key distribution with decoy states. (2005) (281)
- Proof of security of quantum key distribution with two-way classical communications (2001) (281)
- Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. (2013) (279)
- Experimental demonstration of phase-remapping attack in a practical quantum key distribution system (2010) (256)
- Why quantum bit commitment and ideal quantum coin tossing are impossible (1996) (248)
- Concentrating entanglement by local actions: Beyond mean values (1997) (243)
- Finite-key analysis for measurement-device-independent quantum key distribution (2013) (223)
- High-speed quantum random number generation by measuring phase noise of a single-mode laser. (2010) (198)
- Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers (2007) (181)
- Quantum key distribution with entangled photon sources (2007) (174)
- Phase-Remapping Attack in Practical Quantum Key Distribution Systems (2006) (165)
- Ultrafast quantum random number generation based on quantum phase fluctuations. (2011) (155)
- Postprocessing for quantum random number generators: entropy evaluation and randomness extraction (2012) (155)
- Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (2014) (152)
- Simple security proof of twin-field type quantum key distribution protocol (2018) (150)
- Absolute maximal entanglement and quantum secret sharing (2012) (145)
- Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. (2019) (137)
- Loss-tolerant quantum cryptography with imperfect sources (2013) (130)
- Feasibility of quantum key distribution through a dense wavelength division multiplexing network (2010) (117)
- Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw (2011) (116)
- Practical aspects of measurement-device-independent quantum key distribution (2013) (114)
- Security of quantum key distribution using weak coherent states with nonrandom phases (2006) (109)
- Multi-partite quantum cryptographic protocols with noisy GHZ States (2004) (102)
- Proof of unconditional security of six-state quantum key distribution scheme (2001) (101)
- Silicon photonic transmitter for polarization-encoded quantum key distribution (2016) (97)
- Quantum key distribution with an unknown and untrusted source (2008) (91)
- A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution (2010) (81)
- Experimental quantum fingerprinting with weak coherent pulses (2015) (74)
- Fundamental rate-loss trade-off for the quantum internet (2016) (72)
- Experimental measurement-device-independent quantum key distribution with imperfect sources (2015) (68)
- Experimental quantum key distribution with source flaws (2014) (68)
- Classical Communication Cost of Entanglement Manipulation: Is Entanglement an Interconvertible Resource? (1999) (68)
- Performance of two quantum-key-distribution protocols (2006) (67)
- Insecurity of position-based quantum-cryptography protocols against entanglement attacks (2010) (64)
- Measurement-Device-Independent Quantum Cryptography (2014) (64)
- From Quantum Cheating to Quantum Security (2000) (63)
- A simple proof of the unconditional security of quantum key distribution (1999) (62)
- Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound (2018) (60)
- Discrete-phase-randomized coherent state source and its application in quantum key distribution (2014) (59)
- Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels. (2018) (57)
- Some attacks on quantum-based cryptographic protocols (2003) (56)
- Unconditionally secure key distillation from multiphotons (2004) (55)
- Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber (2006) (55)
- Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment (2005) (54)
- Decoy-state quantum key distribution with two-way classical postprocessing (2006) (53)
- Quantum key distribution with triggering parametric down-conversion sources (2008) (53)
- A quantum analog of Huffman coding (1998) (51)
- Long distance measurement-device-independent quantum key distribution with entangled photon sources (2013) (51)
- Effect of source tampering in the security of quantum cryptography (2015) (50)
- Practical decoy state for quantum key distribution (15 pages) (2005) (50)
- Scalable quantum computers : paving the way to realization (2005) (49)
- Space QUEST mission proposal: experimentally testing decoherence due to gravity (2017) (48)
- Security proof of quantum key distribution with detection efficiency mismatch (2008) (48)
- Implementation of two-party protocols in the noisy-storage model (2009) (47)
- Topological approach to Alice electrodynamics (1991) (46)
- Security proof of a three-state quantum-key-distribution protocol without rotational symmetry (2006) (46)
- Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states (2006) (43)
- High-resolution, large dynamic range fiber length measurement based on a frequency-shifted asymmetric Sagnac interferometer. (2005) (42)
- Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters (2019) (41)
- Random bipartite entanglement from W and W-like states. (2006) (39)
- Security analysis of an untrusted source for quantum key distribution: passive approach (2009) (38)
- Experimental quantum key distribution with active phase randomization (2006) (37)
- Method for decoupling error correction from privacy amplification (2002) (37)
- Getting something out of nothing (2005) (36)
- Quantum key distribution with dual detectors (2006) (35)
- Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks (2018) (35)
- Increasing entanglement monotones by separable operations. (2012) (34)
- A tight lower bound on the classical communication cost of entanglement dilution (2002) (33)
- Efficient Quantum Key Distribution (1998) (32)
- Discrete and continuous variables for measurement-device-independent quantum cryptography (2015) (32)
- Security of quantum bit string commitment depends on the information measure. (2006) (29)
- Quantum cryptography with realistic devices (2019) (29)
- Quantum key distribution with setting-choice-independently correlated light sources (2018) (29)
- Polarization insensitive phase modulator for quantum cryptosystems. (2006) (27)
- Foiling covert channels and malicious classical post-processing units in quantum key distribution (2017) (27)
- Prefixed-threshold real-time selection method in free-space quantum key distribution (2017) (25)
- Universal squash model for optical communications using linear optics and threshold detectors (2010) (25)
- On the performance of two protocols: SARG04 and BB84 (2005) (24)
- Machine learning for optimal parameter prediction in quantum key distribution (2018) (23)
- Simple method for asymmetric twin-field quantum key distribution (2019) (22)
- Phase randomization improves the security of quantum key distribution (2005) (22)
- Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses (2020) (22)
- TWO-WAY QUANTUM COMMUNICATION CHANNELS (2005) (20)
- Quantum key distribution with vacua or dim pulses as decoy states (2004) (20)
- Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment) (1997) (19)
- Making an Empty Promise with a Quantum Computer Typeset Using Revt E X (1997) (18)
- Conference key agreement and quantum sharing of classical secrets with noisy GHZ states (2005) (18)
- Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors (2013) (18)
- On the (Im)Possibility of Quantum String Commitment (2005) (18)
- A brief introduction of quantum cryptography for engineers (2010) (17)
- Random-party entanglement distillation in multiparty states (2008) (16)
- Quantum coding theorem for mixed states (1995) (16)
- Quantum key distribution based on a Sagnac loop interferometer and polarization-insensitive phase modulators (2006) (14)
- Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals (2010) (13)
- Randomly distilling W-class states into general configurations of two-party entanglement (2011) (13)
- Discrete-variable measurement-device-independent quantum key distribution suitable for metropolitan networks (2015) (13)
- Toward a reconfigurable quantum network enabled by a broadband entangled source (2015) (12)
- Quantum key distribution based on arbitrarily weak distillable entangled states. (2005) (12)
- Practical Measurement Device Independent Quantum Key Distribution (2013) (11)
- Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances (1998) (11)
- QUANTUM CRYPTOGRAPHY: FROM THEORY TO PRACTICE (2007) (11)
- Security of Quantum Key Distribution (1998) (11)
- A Survey on Quantum Cryptographic Protocols and Their Security (2007) (11)
- Integrated Silicon Photonic Transmitter for Polarization-Encoded Quantum Key Distribution (2016) (11)
- Reflectometry based on a frequency-shifted interferometer using sideband interference. (2013) (11)
- Free-space reconfigurable quantum key distribution network (2015) (10)
- Remote Blind State Preparation with Weak Coherent Pulses in the Field. (2019) (10)
- Blind Quantum Computing with Decoy States (2015) (10)
- Bounds on probability of transformations between multipartite pure states (2009) (9)
- Will Quantum Cryptography ever become a successful technology in the marketplace (1999) (9)
- Quantum cryptography in noisy channels (1995) (9)
- Entanglement monotones for W-type states (2012) (9)
- Security of quantum key distribution with iterative sifting (2016) (9)
- Security of high speed quantum key distribution with finite detector dead time (2010) (9)
- Secure quantum communication in the presence of phase- and polarization-dependent loss (2018) (8)
- Multi-party Agile QKD network with a fiber-based entangled source (2015) (8)
- Characterization of State-Preparation Uncertainty in Quantum Key Distribution (2022) (7)
- Simple Multiuser Twin-Field Quantum Key Distribution Network (2021) (7)
- Multi-party Agile Quantum Key Distribution Network with a Broadband Fiber-based Entangled Source (2015) (7)
- Enabling a Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Network (2018) (7)
- Optimal entanglement transformations among N-qubit W-class states (2010) (7)
- Upper bounds for the secure key rate of the decoy-state quantum key distribution (2009) (7)
- Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources (2019) (7)
- Erratum: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw [Phys. Rev. A 85, 042307 (2012)] (2012) (6)
- Experimental Quantum Fingerprinting (2015) (6)
- Primality Test Via Quantum Factorization (1995) (6)
- Experimental demonstration of a high speed quantum random number generation scheme based on measuring phase noise of a single mode laser (2009) (6)
- One-Way Functions in Reversible Computations (1995) (6)
- Quantum Cryptography (2008) (5)
- Quantum Complementarity Approach to Device-Independent Security (2021) (5)
- Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite states (2004) (5)
- Detecting Entanglement in Unfaithful States (2020) (5)
- A tight lower bound on the classical communication cost of entanglement dilution (2003) (4)
- Bridging the gap between theory and practice in quantum cryptography (2015) (4)
- Passive preparation of BB84 signal states with coherent light (2011) (4)
- Entropic uncertainty relations and the measurement range problem, with consequences for high-dimensional quantum key distribution (2018) (4)
- How to implement two-party protocols in the noisy-storage model (2009) (4)
- Experimental Decoy State Quantum Key Distribution Over 15km (2005) (4)
- Quantum repeaters: From quantum networks to the quantum internet (2022) (4)
- Quantum key distribution with an untrusted source (2009) (4)
- Decoy State Quantum Key Distribution: Theory and Practice (2007) (4)
- How much does it cost to teleport (1996) (4)
- Prefixed-threshold Real-Time Selection for Free-Space Measurement-Device-Independent Quantum Key Distribution (2019) (4)
- Complementarity in wormhole chromodynamics (1993) (4)
- A high-speed quantum random number generator prototype (2013) (3)
- Increasing Entanglement by Separable Operations and New Monotones for W-type Entanglement (2011) (3)
- Why quantum bit commitment and quantum coin tossing are impossible (1996) (3)
- Measurement-device-independent quantum key distribution with passive time-dependent source side channels (2021) (3)
- Discrete rotational symmetry and quantum-key-distribution protocols (2006) (3)
- Tomography-based Quantum Key Distribution (2020) (3)
- Experimental implementation of a three-party quantum key distribution protocol (2006) (3)
- Teaching, Propaganda, and the Middle Ground (2000) (3)
- Quantum hacking: attacking practical quantum key distribution systems (2007) (3)
- Quantum optics in computing and communications : 16-17 October 2002, Shanghai, China (2002) (3)
- Insecurity of Quantum Secure Computations Typeset Using Revt E X 2 (1998) (2)
- Improve the efficiency of a practical quantum key distribution system (2007) (2)
- Efficient experimental quantum fingerprinting with wavelength division multiplexing (2020) (2)
- Gaussian-modulated coherent state quantum key distribution experiment over 20km telecommunication fiber (2008) (2)
- Error correction and security in quantum cryptography (2003) (2)
- Loss-tolerant quantum key distribution with mixed signal states (2020) (2)
- 09 05 3 v 1 2 7 Se p 19 97 HKUPHYS-HFC-03 Making An Empty Promise With A Quantum Computer (1997) (2)
- Dual detectors scheme in practical quantum key distribution systems (2007) (2)
- Efficient experimental quantum fingerprinting with channel multiplexing and simultaneous detection (2021) (2)
- Random multiparty entanglement distillation (2007) (2)
- Quantum Key Infrastructure: A scalable quantum-proof key distribution system (2022) (2)
- Passive Estimate of an Untrusted Source for Quantum Key Distribution (2009) (1)
- Cryptography's quantum barrier (2000) (1)
- Unconditionally secure polarization based Quantum Key Distribution with laser pulses implementations (2004) (1)
- Measurement-device-independent QKD over asymmetric channels (2019) (1)
- Scalable Measurement-Device-Independent Quantum Key Distribution Networks with Untrusted Relays (2020) (1)
- Quantum key distribution secure against partly malicious devices (2017) (1)
- Fully-Passive Quantum Key Distribution (2022) (1)
- Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system (2022) (1)
- Elusive Order Parameters for Non-Abelian Gauge Theories (1995) (1)
- Insecurity of Quantum Computations (1998) (1)
- Excess noise control in Gaussian-modulated coherent state quantum key distribution system (2008) (1)
- A quantum leap in security (2021) (1)
- No Superluminal Signaling Implies Unconditionally Secure Bit Commitment (2014) (1)
- 09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice (2009) (1)
- Sagnac quantum key distribution using novel polarization-insensitive phase modulators based on frequency shift (2006) (1)
- ov 2 00 1 From Quantum Cheating to Quantum Security ∗ (2000) (0)
- PACKARD Insecurity of Quantum Secure Computations (2001) (0)
- 06 11 04 4 v 1 3 N ov 2 00 6 Quantum key distribution with “ dual detectors (0)
- Publisher's Note: Randomly distilling W-class states into general configurations of two-party entanglement [Phys. Rev. A 84, 052301 (2011)] (2011) (0)
- Editorial: quantum information and quantum control (2005) (0)
- New Entanglement Monotones for W-type States (2013) (0)
- Quantum Cloning with a Broadband Optical Amplifier (2006) (0)
- Managing backscattering noise in Sagnac-loop twin-field quantum key distribution (2021) (0)
- Tagging idea in continuous variable quantum key distribution and its application (2020) (0)
- Quantum Discord Witness with Uncharacterized Devices (2023) (0)
- Wavefunctions for Non-Abelian Vortices (1995) (0)
- Quantum Key Distribution: A Resource Letter (2016) (0)
- Quantum key distribution with setting-choice-independently correlated light sources (2019) (0)
- Fully-Passive Twin-Field Quantum Key Distribution (2023) (0)
- 1 2 2 Fe b 20 07 Quantum Cryptography : from Theory to Practice (0)
- Title Phase encoding schemes for measurement-device-independentquantum key distribution with basis-dependent flaw (2012) (0)
- Proof-of-Principle Demonstration of Fully-Passive Quantum Key Distribution (2023) (0)
- 2 20 J an 2 00 5 Decoy State Quantum Key Distribution (2005) (0)
- 01 02 5 v 1 1 2 Ja n 19 99 How to share a quantum secret (2008) (0)
- Interrogation of multiplexed fiber grating sensors using frequency-shifted interferometer (2006) (0)
- O ct 1 99 7 HKUPHYS-HFC-03 ; quant-ph / 9709053 Making An Empty Promise With A Quantum Computer (2018) (0)
- Erratum: Optimal entanglement transformations among N -qubit W -class states (Physical Review A - Atomic, Molecular, and Optical Physics (2010) 82 062314)) (2014) (0)
- Foiling covert channels and malicious classical post-processing units in quantum key distribution (2019) (0)
- Order Parameters for Non-Abelian Gauge Theories (1994) (0)
- Time-dependent Side Channels in Quantum Key Distribution (2021) (0)
- Title Experimental quantum fingerprinting with weak coherent pulses (2015) (0)
- Simple security proof of twin-field type quantum key distribution protocol (2019) (0)
- Exotic phenomena in non-Abelian gauge theories (1994) (0)
- Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters (2019) (0)
- Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite quantum states (2005) (0)
- Proof-of-Principle Experimental Demonstration of Twin-Field Quantum Key Distribution over Asymmetric Channels (2020) (0)
- 9pXE-4 Error Correction and Security in Quantum Cryptography (2002) (0)
- Composable Security of Distributed Symmetric Key Exchange Protocol (2023) (0)
- Passive continuous variable quantum key distribution (2022) (0)
- Foiling Quantum Hackers (2013) (0)
- Secure Key from Quantum Discord (2023) (0)
- Battling with quantum hackers (2017) (0)
- Frequency-shifted interferometer and its applications (2006) (0)
- Experimental techniques to enhance the performance of quantum key distribution systems (2007) (0)
- Broadband multipoint sensing with single-arm frequency-shifted interferometry (2013) (0)
- Quantum cryptography with malicious devices (2018) (0)
- qu an tph / 9 80 30 07 v 3 2 3 M ay 1 99 8 Efficient Quantum Key Distribution (1998) (0)
- Continuous-Variables Quantum Key Distribution over Standard Telecom Fiber (2006) (0)
- Why Quantum Information Processing (2003) (0)
- Thanks to 2011 Reviewers (2012) (0)
- Quantum key distribution with entangled sources (2007) (0)
- Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses (2021) (0)
- Improving performance of decoy-state free-space QKD using information on fluctuating transmittance in turbulent channel (2017) (0)
- How cryptology went commercial (2001) (0)
- Quantum network with trusted and untrusted relays (2012) (0)
- Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources (2021) (0)
- Resource-efficient real-time polarization compensation for MDI-QKD with rejected data (2021) (0)
- One-way continuous-variable quantum key distribution over 5km of standard telecom fiber (2007) (0)
- Viewpoint: Foiling Quantum Hackers (2013) (0)
- Decoy state protocols for quantum cryptography with parametric down conversion sources (2007) (0)
- ua nt-p h / 95 04 00 4 v 2 1 9 A pr 1 99 5 IASSNS-HEP-95 / 23 Quantum Coding Theorem for Mixed States (2008) (0)
- A quantum jump in security (2003) (0)
- Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution (2005) (0)
- Wave functions for nonAbelian vortices (1995) (0)
- Title Universal squash model for optical communications using linearoptics and threshold detectors (2011) (0)
This paper list is powered by the following services:
