Results 11 to 20 of about 12,882 (191)

Quantum Key Distribution Networks: Challenges and Future Research Issues in Security

open access: yesApplied Sciences, 2021
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical ...
Chia-Wei Tsai   +4 more
doaj   +1 more source

Security of device-independent quantum key distribution protocols: a review [PDF]

open access: yesQuantum, 2023
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security, as it can be performed securely with uncharacterised black-box devices.
Ignatius W. Primaatmaja   +5 more
doaj   +1 more source

Software-Defined Networking Orchestration for Interoperable Key Management of Quantum Key Distribution Networks

open access: yesEntropy, 2023
This paper demonstrates the use of software-defined networking (SDN) orchestration to integrate regionally separated networks in which different network parts use incompatible key management systems (KMSs) managed by different SDN controllers to ensure ...
Dong-Hi Sim   +2 more
doaj   +1 more source

2×N twin-field quantum key distribution network configuration based on polarization, wavelength, and time division multiplexing

open access: yesnpj Quantum Information, 2022
Developing quantum key distribution (QKD) has been recently directed toward distance extension and network expansion for real-world secure communications.
Chang Hoon Park   +10 more
doaj   +1 more source

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures [PDF]

open access: yesIranian Journal of Information Processing & Management
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman ...
Leena Sameer Baddour   +4 more
doaj   +1 more source

State independent QKD

open access: yes, 2023
We present an adaptive procedure for aligning quantum non-locality experiments without any knowledge of the two-qudit state shared by the participating parties. The quantum state produced by the source, its unitary evolution as well as the actual measurement bases remain unknown to both parties at all times.
Kindler, Robert   +5 more
openaire   +2 more sources

Enabling Resilient Quantum-Secured Microgrids Through Software-Defined Networking

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum key distribution (QKD) has been considered a potent and mature approach to secure communication in the quantum era. However, there exist resilience gaps that hinder the practical usefulness of QKD.
Zefan Tang, Peng Zhang, Walter O. Krawec
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Hong-Ou-Mandel interference between independent III-V on silicon waveguide integrated lasers [PDF]

open access: yes, 2019
The versatility of silicon photonic integrated circuits has led to a widespread usage of this platform for quantum information based applications, including Quantum Key Distribution (QKD).
Agnesi, C.   +14 more
core   +2 more sources

QKD: Recovering Unused Quantum Bits [PDF]

open access: yes2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Practical quantum key distribution gain is usually less than the theoretical limit, this is due to the imperfection of physical devices, quantum channels, and the lost qubits due to test carried out for for the identification of the presence of an eavesdropper and the consequence reduction of obtained knowledge.
Abdulla M. Abu-ayyash, Naim Ajlouni
openaire   +1 more source

Home - About - Disclaimer - Privacy