Results 31 to 40 of about 47,878 (305)
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang+5 more
doaj +1 more source
Power Network Optimization: A Quantum Approach
Optimization of electricity surplus is a crucial element for transmission power networks since it leads to reducing costs as well as increasing efficiency across the network as a whole.
Giuseppe Colucci+2 more
doaj +1 more source
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang+6 more
doaj +1 more source
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein+2 more
openaire +3 more sources
Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances ...
Xiao-Lei Jiang+16 more
doaj +1 more source
Semi-quantum cryptography [PDF]
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Hasan Iqbal, Walter O. Krawec
openaire +2 more sources
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim+2 more
doaj +1 more source
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan+3 more
doaj +1 more source
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity.
Abdulbast A. Abushgra
doaj +1 more source
Advantage distillation technology increases the collection between raw keys in quantum key distribution systems. Combining a decoy state method with advantage distillation technology, the authors demonstrate improved maximal transmission distance and ...
Hong-Wei Li+3 more
doaj +1 more source