Results 11 to 20 of about 8,659,098 (325)

Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation [PDF]

open access: yesQuantum, 2021
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation,
Aur'elie Denys   +2 more
semanticscholar   +1 more source

Quantum key distribution using deterministic single-photon sources over a field-installed fibre link [PDF]

open access: yesnpj Quantum Information, 2023
Quantum-dot-based single-photon sources are key assets for quantum information technology, supplying on-demand scalable quantum resources for computing and communication.
M. Zahidy   +14 more
semanticscholar   +1 more source

Mode-pairing quantum key distribution [PDF]

open access: yesNature Communications, 2022
Quantum key distribution — the establishment of information-theoretically secure keys based on quantum physics — is mainly limited by its practical performance, which is characterised by the dependence of the key rate on the channel transmittance R(η ...
Pei Zeng   +3 more
semanticscholar   +1 more source

Security of device-independent quantum key distribution protocols: a review [PDF]

open access: yesQuantum, 2022
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security, as it can be performed securely with uncharacterised black-box devices.
I. W. Primaatmaja   +5 more
semanticscholar   +1 more source

Implementation Security in Quantum Key Distribution [PDF]

open access: yesAdvanced Quantum Technologies, 2023
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. Here, a succint review is provided on this topic, focusing on discrete‐
Víctor Zapatero   +2 more
semanticscholar   +1 more source

The ideal wavelength for daylight free-space quantum key distribution [PDF]

open access: yesAPL Quantum, 2023
Quantum key distribution (QKD) has matured in recent years from laboratory proof-of-principle demonstrations to commercially available systems. One of the major bottlenecks is the limited communication distance in fiber networks due to the exponential ...
Mostafa Abasifard   +7 more
semanticscholar   +1 more source

Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron Nitride [PDF]

open access: yesAdvanced Quantum Technologies, 2023
Quantum key distribution (QKD) is considered the most immediate application to be widely implemented among a variety of potential quantum technologies. QKD enables sharing secret keys between distant users by using photons as information carriers.
Ali Al-Juboori   +8 more
semanticscholar   +1 more source

Data Verification in the Agent, Combining Blockchain and Quantum Keys by Means of Multiple-Valued Logic

open access: yesApplied System Innovation, 2023
Network control of autonomous robotic devices involves a vast number of secured data coding, verification, and identification procedures to provide reliable work of distant agents. Blockchain scheme provides here the model of the extended linked list for
Alexey Yu. Bykovsky, Nikolay A. Vasiliev
doaj   +1 more source

Advances in device-independent quantum key distribution [PDF]

open access: yesnpj Quantum Information, 2022
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only does it allow for information-theoretic security based on quantum mechanics, but it also relaxes the need to physically model the devices ...
Víctor Zapatero   +6 more
semanticscholar   +1 more source

A device-independent quantum key distribution system for distant users [PDF]

open access: yesNature, 2021
Device-independent quantum key distribution (DIQKD) enables the generation of secret keys over an untrusted channel using uncharacterized and potentially untrusted devices1–9.
Wei Zhang   +10 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy