Results 1 to 10 of about 460,882 (215)

Security of Quantum Key Distribution

open access: yesIEEE Access, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj   +5 more sources

Decoy State Quantum Key Distribution [PDF]

open access: greenPhysical Review Letters, 2005
Slightly shortened version.
Hoi‐Kwong Lo, Xiongfeng Ma, Kai Chen
core   +7 more sources

Chaotic Quantum Key Distribution [PDF]

open access: yesCryptography, 2020
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched.
Noah Cowper, Harry Shaw, David Thayer
doaj   +2 more sources

Chip-based quantum key distribution [PDF]

open access: yesNature Communications, 2017
Quantum key distribution has not been widely adopted in part due to technical hurdles preventing it being fully integrated in classical communication networks.
P. Sibson   +12 more
doaj   +7 more sources

Mode-pairing quantum key distribution [PDF]

open access: yesNature Communications, 2022
Measurement-device-independent QKD schemes suffer from a trade-off between ease of implementation (avoiding the need for global phase locking) and high rates (quadratic improvement in rate).
Pei Zeng   +3 more
doaj   +2 more sources

A Proof of the Security of Quantum Key Distribution [PDF]

open access: greenJournal of Cryptology, 1999
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics.
Eli Biham   +4 more
openalex   +6 more sources

Phase-Matching Quantum Key Distribution [PDF]

open access: yesPhysical Review X, 2018
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information ...
Xiongfeng Ma, Pei Zeng, Hongyi Zhou
doaj   +5 more sources

A Key Verification Protocol for Quantum Key Distribution [PDF]

open access: yesIEEE Access, 2019
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques.
Gunes Karabulut Kurt   +3 more
doaj   +5 more sources

Quantum key distribution with chromatic codes [PDF]

open access: yesLight: Science & Applications
Quantum key distribution with different frequency codes is demonstrated with a reconfigurable entanglement distribution network, which is essential for scalable and resource-efficient quantum communications.
Zhihui Yan, Xiaojun Jia
doaj   +2 more sources

Receiver-Device-Independent Quantum Key Distribution [PDF]

open access: yesQuantum, 2022
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box.
Marie Ioannou   +11 more
doaj   +1 more source

Home - About - Disclaimer - Privacy