Results 11 to 20 of about 8,141,629 (261)

Megabits secure key rate quantum key distribution [PDF]

open access: yesConference on Lasers and Electro-Optics/International Quantum Electronics Conference, 2008
Quantum cryptography (QC) can provide unconditional secure communication between two authorized parties based on the basic principles of quantum mechanics.
Asobe, M.   +12 more
core   +2 more sources

High Key Rate Quantum Conference Key Agreement With Unconditional Security [PDF]

open access: yesIEEE Access, 2021
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao   +5 more
doaj   +3 more sources

Key Rate of the B92 Quantum Key Distribution Protocol with Finite Qubits [PDF]

open access: yes2015 IEEE International Symposium on Information Theory (ISIT), 2015
The key rate of the B92 quantum key distribution protocol had not been reported before this research when the number of qubits is finite. We compute it by using the security analysis framework proposed by Scarani and Renner in 2008.Comment: 4 pages, 2 ...
Matsumoto, Ryutaroh   +2 more
core   +2 more sources

Improved Asymptotic Key Rate of the B92 Protocol [PDF]

open access: yes2013 IEEE International Symposium on Information Theory, 2013
We analyze the asymptotic key rate of the single photon B92 protocol by using Renner's security analysis given in 2005. The new analysis shows that the B92 protocol can securely generate key at 6.5% depolarizing rate, while the previous analyses cannot ...
Matsumoto, Ryutaroh
core   +2 more sources

Upper bounds for the secure key rate of decoy state quantum key distribution [PDF]

open access: yesPhysical Review A, 2009
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals.
D. Gottesman   +11 more
core   +3 more sources

Higher-rate relativistic quantum key distribution [PDF]

open access: yesScientific Reports, 2021
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key ...
Georgi Bebrov
doaj   +3 more sources

Secret Key Agreement under Discussion Rate Constraints [PDF]

open access: yes2017 IEEE International Symposium on Information Theory (ISIT), 2017
For the multiterminal secret key agreement problem, new single-letter lower bounds are obtained on the public discussion rate required to achieve any given secret key rate below the secrecy capacity.
Chan, Chung   +3 more
core   +2 more sources

Discrete-modulation continuous-variable quantum key distribution with a high key rate

open access: yesNew Journal of Physics, 2023
Discrete-modulation continuous-variable (CV) quantum key distribution has the potential for large-scale deployment in secure quantum communication networks owing to its low implementation complexity and compatibility with the current coherent optical ...
Pu Wang   +4 more
doaj   +3 more sources

Numerical calculations of the finite key rate for general quantum key distribution protocols [PDF]

open access: yesPhysical Review Research, 2021
Finite key analysis of quantum key distribution (QKD) is an important tool for any QKD implementation. While much work has been done on the framework of finite key analysis, the application to individual protocols often relies on the specific protocol ...
Ian George, Jie Lin, Norbert Lütkenhaus
doaj   +3 more sources

Reliable numerical key rates for quantum key distribution [PDF]

open access: yesQuantum, 2018
In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our approach by finding higher key rates than those previously reported in the literature for several interesting scenarios (e.g., the Trojan-horse attack and the phase ...
Adam Winick   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy