Results 31 to 40 of about 12,882 (191)
Source attack of decoy-state quantum key distribution using phase information [PDF]
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun +9 more
core +2 more sources
On High-Dimensional Twin-Field Quantum Key Distribution [PDF]
Twin-Field Quantum Key Distribution (QKD) is a QKD protocol that uses single-photon interference to perform QKD over long distances. QKD protocols that encode information using high-dimensional quantum states can benefit from increased key rates and ...
Ronny Mueller +4 more
doaj +1 more source
Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters.
Ke Xue +3 more
doaj +1 more source
Measurement-device-independent quantum communication with an untrusted source [PDF]
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core +2 more sources
Effects of experimental impairments on the security of continuous-variable quantum key distribution
Quantum Key Distribution (QKD) is a cutting-edge communication method that enables secure communication between two parties. Continuous-variable QKD (CV-QKD) is a promising approach to QKD that has several advantages over traditional discrete-variable ...
Andres Ruiz-Chamorro +3 more
doaj +1 more source
Quantum Key Distribution [PDF]
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction
Chan, Philip +3 more
core +2 more sources
QComms QKD Software Toolkit [PDF]
The software provides a set of interfaces, algorithms and tools to produce a full Quantum Key Distribution system with device and key management. The aim is to reduce the barrier to entry into QKD systems by developing a strong architecture with well defined interfaces.
Collins, Richard +3 more
openaire +3 more sources
Experimental Decoy Quantum Key Distribution Up To 130KM Fiber
Decoy State Quantum Key Distribution (QKD), being capable of beating PNS attack and uncon- ditionally secure, have become an attractive one recently.
Bennett C H +9 more
core +1 more source
MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L. +8 more
core +2 more sources
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences a phase attack security challenge due to the reference pulses transmitted along with quantum signals over an unsecure quantum channel.
Khaled Alaghbari +4 more
doaj +1 more source

