Results 11 to 20 of about 3,809 (250)

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Power Network Optimization: A Quantum Approach

open access: yesIEEE Access, 2023
Optimization of electricity surplus is a crucial element for transmission power networks since it leads to reducing costs as well as increasing efficiency across the network as a whole.
Giuseppe Colucci   +2 more
doaj   +1 more source

Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction

open access: yesEntropy, 2022
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang   +6 more
doaj   +1 more source

Security analysis of measurement-device-independent quantum conference key agreement with weak randomness

open access: yesFrontiers in Physics, 2023
Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances ...
Xiao-Lei Jiang   +16 more
doaj   +1 more source

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
openaire   +3 more sources

Experimental Quantum Cryptography [PDF]

open access: yesJournal of Cryptology, 1991
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bennett, Charles H.   +4 more
openaire   +2 more sources

Relativistic quantum cryptography [PDF]

open access: yesLaser Physics Letters, 2014
Quantum key distribution (QKD) is a concept of secret key exchange supported by fundamentals of quantum physics. Its perfect realization offers unconditional key security, however, known practical schemes are potentially vulnerable if the quantum channel loss exceeds a certain realization-specific bound.
Radchenko, I. V.   +3 more
openaire   +2 more sources

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy