Results 1 to 10 of about 494,318 (320)
Security of Quantum Key Distribution
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj +5 more sources
Chaotic Quantum Key Distribution [PDF]
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched.
Noah Cowper, Harry Shaw, David Thayer
doaj +2 more sources
Decoherence-assisted quantum key distribution [PDF]
We put forward and demonstrate a controllable decoherence-assisted quantum key distribution scheme. The protocol is based on the possibility of introducing controllable decoherence to polarization qubits using the spatial degree of freedom of light.
Daniel R. Sabogal+5 more
doaj +2 more sources
Chip-based quantum key distribution [PDF]
Quantum key distribution has not been widely adopted in part due to technical hurdles preventing it being fully integrated in classical communication networks.
P. Sibson+12 more
doaj +7 more sources
A Proof of the Security of Quantum Key Distribution [PDF]
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics.
Eli Biham+4 more
openalex +6 more sources
Mode-pairing quantum key distribution [PDF]
Measurement-device-independent QKD schemes suffer from a trade-off between ease of implementation (avoiding the need for global phase locking) and high rates (quadratic improvement in rate).
Pei Zeng+3 more
doaj +2 more sources
Phase-Matching Quantum Key Distribution [PDF]
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information ...
Xiongfeng Ma, Pei Zeng, Hongyi Zhou
doaj +5 more sources
A Key Verification Protocol for Quantum Key Distribution [PDF]
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques.
Gunes Karabulut Kurt+3 more
doaj +5 more sources
Receiver-Device-Independent Quantum Key Distribution [PDF]
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box.
Marie Ioannou+11 more
doaj +1 more source
Quantum Key Distribution Networks: Challenges and Future Research Issues in Security
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical ...
Chia-Wei Tsai+4 more
doaj +1 more source