Results 171 to 180 of about 12,882 (191)
Some of the next articles are maybe not open access.

QKD in existing networks

IEE Seminar on Quantum Cryptography: Secure Communications, 2005
This paper presents a slide presentation of quantum key distribution (QKD) on existing networks. The limitations of QKD in existing network infrastructure and the proposed solutions are presented. The QKD in OSI model and an overview of different deployment scenarios are included in the presentation. (2 pages)
openaire   +1 more source

FBG-Based Multidimensional QKD

2018 20th International Conference on Transparent Optical Networks (ICTON), 2018
In this paper, we propose several FBG-based both weak coherent state and entanglement assisted multidimensional QKD (MQKD) protocols with mutually unbiased bases (MUBs) derived from the complex Hadamard matrices. We also propose how to implement them by using FBGs with orthogonal impulse responses.
openaire   +1 more source

Information reconciliation for QKD

Quantum Information and Computation, 2011
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string ---the key--- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured ...
David Elkouss   +2 more
openaire   +1 more source

QKD standardization at ETSI

AIP Conference Proceedings, 2012
The present document starts with a brief introduction of ETSI, followed by an overview of locations where QKD has already been deployed commercially. The various scenarios of QKD deployment lead to a strong need for standardization. Before going into detail about the work of the ETSI standardization group for QKD the paper gives some general ...
openaire   +1 more source

Quantum-Key Distribution (QKD) Fundamentals

2019
This chapter is devoted to QKD fundamentals. The chapter starts with description of key differences between conventional cryptography, classical physical-layer security (PLS), and QKD. In section on QKD basics, after historical overview, we review different QKD types and describe briefly common postprocessing steps, namely, information reconciliation ...
openaire   +1 more source

Entangling probes of QKD

SPIE Proceedings, 2006
Following a review of the measure of Renyi information gain and its optimization, the quantum circuits and designs are reviewed of optimized entangling probes for attacking the BB84 protocol of quantum key distribution (QKD), extracting maximum Renyi information on the pre-privacy amplified key.
openaire   +1 more source

QKD BB84. A Taxonomy

2021 XLVII Latin American Computing Conference (CLEI), 2021
Mathias Zavala, Beniamin Baran
openaire   +1 more source

Discrete Variable (DV) QKD

2019
This chapter is devoted to the discrete variable (DV) QKD protocols and represents the continuation of Chap. 6. The chapter starts with the description of BB84 and decoy-state-based protocols, and evaluation of their secrecy fraction performance in terms of achievable distance.
openaire   +1 more source

Novel schemes for QKD

2016
Quantum cryptography or quantum key distribution (QKD) in particular is the frst application of quantum theory that is about to accomplish the leap from laboratory to industry. This story of success was enabled by plenty of theoretical and experimental research over the past 30 years.
openaire   +1 more source

Continuous Variable (CV)-QKD

2019
This chapter is devoted to the detailed description of continuous variable (CV) QKD schemes, in particular, with Gaussian modulation and discrete modulation. The chapter starts with the fundamentals of Gaussian quantum information theory, where the P-representation is introduced and applied to represent the thermal noise as well as the thermal noise ...
openaire   +1 more source

Home - About - Disclaimer - Privacy