Results 31 to 40 of about 12,882 (191)

Source attack of decoy-state quantum key distribution using phase information [PDF]

open access: yes, 2013
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun   +9 more
core   +2 more sources

On High-Dimensional Twin-Field Quantum Key Distribution [PDF]

open access: yesQuantum
Twin-Field Quantum Key Distribution (QKD) is a QKD protocol that uses single-photon interference to perform QKD over long distances. QKD protocols that encode information using high-dimensional quantum states can benefit from increased key rates and ...
Ronny Mueller   +4 more
doaj   +1 more source

Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method

open access: yesEntropy, 2022
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters.
Ke Xue   +3 more
doaj   +1 more source

Measurement-device-independent quantum communication with an untrusted source [PDF]

open access: yes, 2015
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core   +2 more sources

Effects of experimental impairments on the security of continuous-variable quantum key distribution

open access: yesHeliyon, 2023
Quantum Key Distribution (QKD) is a cutting-edge communication method that enables secure communication between two parties. Continuous-variable QKD (CV-QKD) is a promising approach to QKD that has several advantages over traditional discrete-variable ...
Andres Ruiz-Chamorro   +3 more
doaj   +1 more source

Quantum Key Distribution [PDF]

open access: yes, 2011
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction
Chan, Philip   +3 more
core   +2 more sources

QComms QKD Software Toolkit [PDF]

open access: yesJournal of Open Source Software, 2019
The software provides a set of interfaces, algorithms and tools to produce a full Quantum Key Distribution system with device and key management. The aim is to reduce the barrier to entry into QKD systems by developing a strong architecture with well defined interfaces.
Collins, Richard   +3 more
openaire   +3 more sources

Experimental Decoy Quantum Key Distribution Up To 130KM Fiber

open access: yes, 2007
Decoy State Quantum Key Distribution (QKD), being capable of beating PNS attack and uncon- ditionally secure, have become an attractive one recently.
Bennett C H   +9 more
core   +1 more source

MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]

open access: yes, 2015
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L.   +8 more
core   +2 more sources

Adaptive Modulation for Continuous-Variable Quantum Key Distribution With Real Local Oscillators Under Phase Attack

open access: yesIEEE Photonics Journal, 2021
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences a phase attack security challenge due to the reference pulses transmitted along with quantum signals over an unsecure quantum channel.
Khaled Alaghbari   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy