Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks [PDF]
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate detector side channels and prevent all attacks on detectors. The future of MDI-QKD is a quantum network that provides service to many users over untrusted relay nodes.
Lo, Hoi-Kwong, Wang, Wenyuan, Xu, Feihu
core +2 more sources
This paper proposes a novel key distribution method based on the masking effect of fiber channel noise in a power transmission system. The two physical layer signal processing technologies used in this solution are frame synchronization and resampling ...
Xiangqing Wang +7 more
doaj +1 more source
Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation [PDF]
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation,
Aurélie Denys +2 more
doaj +1 more source
Tomography increases key rates of quantum-key-distribution protocols [PDF]
We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill.
Shun Watanabe +2 more
openaire +2 more sources
Second-order coding rates for key distillation in quantum key distribution
The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the
Mark M. Wilde +3 more
openaire +2 more sources
Long-distance quantum key distribution using concatenated entanglement swapping with practical resources [PDF]
We present our approach for sharing photons and assessing resultant four-photon visibility between two distant parties using concatenated entanglement swapping. In addition we determine the corresponding key generation rate and the quantum bit-error rate.
Khalique, Aeysha, Sanders, Barry C.
core +2 more sources
Affordable Credit Resources to Implement Investment Projects in Industry of Russia
Raising loan finance by industrial enterprises for the development of their investment projects is an important factor for economic growth in Russia.
V. A. Eremkin
doaj +1 more source
Key rates for quantum key distribution protocols with asymmetric noise
We consider the asymptotic key rates achieved in the simplest quantum key distribution protocols, namely the BB84 and the six-state protocols, when non-uniform noise is present in the system. We first observe that higher qubit error rates do not necessarily imply lower key rates. Secondly, we consider protocols with advantage distillation and show that
Gláucia Murta +4 more
openaire +5 more sources
Analysis of detector performance in a gigahertz clock rate quantum key distribution system [PDF]
We present a detailed analysis of a gigahertz clock rate environmentally robust phase-encoded quantum key distribution (QKD) system utilizing several different single-photon detectors, including the first implementation of an experimental resonant cavity
+29 more
core +1 more source
Inflation and measures to regulate it in current economic environment
Introduction. The analysis of inflation and the development of measures to regulate it play a key role in ensuring economic stability and sustainable development.
J. A. Konopleva +2 more
doaj +1 more source

