Results 1 to 10 of about 7,359 (290)
Beyond Binary: The Capabilities of Classical and Quantum Computing for Securing Data Transmission [PDF]
In the present times, the demand for sophisticated encryption methods has escalated, especially for securing data transmission in vulnerable environments.
Prasad Paruchuri B.V.N.+4 more
doaj +1 more source
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang+6 more
doaj +1 more source
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu+9 more
doaj +1 more source
Cryptography: Advances in Secure Communication and Data Protection [PDF]
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin+4 more
doaj +1 more source
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu+9 more
doaj +1 more source
Phase-Matching Quantum Key Distribution with Discrete Phase Randomization
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang+6 more
doaj +1 more source
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou+7 more
doaj +1 more source
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang+5 more
doaj +1 more source
Power Network Optimization: A Quantum Approach
Optimization of electricity surplus is a crucial element for transmission power networks since it leads to reducing costs as well as increasing efficiency across the network as a whole.
Giuseppe Colucci+2 more
doaj +1 more source
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang+6 more
doaj +1 more source