Results 1 to 10 of about 494,318 (320)

Security of Quantum Key Distribution

open access: yesIEEE Access, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj   +5 more sources

Chaotic Quantum Key Distribution [PDF]

open access: yesCryptography, 2020
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched.
Noah Cowper, Harry Shaw, David Thayer
doaj   +2 more sources

Decoherence-assisted quantum key distribution [PDF]

open access: yesScientific Reports
We put forward and demonstrate a controllable decoherence-assisted quantum key distribution scheme. The protocol is based on the possibility of introducing controllable decoherence to polarization qubits using the spatial degree of freedom of light.
Daniel R. Sabogal   +5 more
doaj   +2 more sources

Chip-based quantum key distribution [PDF]

open access: yesNature Communications, 2017
Quantum key distribution has not been widely adopted in part due to technical hurdles preventing it being fully integrated in classical communication networks.
P. Sibson   +12 more
doaj   +7 more sources

A Proof of the Security of Quantum Key Distribution [PDF]

open access: greenJournal of Cryptology, 1999
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics.
Eli Biham   +4 more
openalex   +6 more sources

Mode-pairing quantum key distribution [PDF]

open access: yesNature Communications, 2022
Measurement-device-independent QKD schemes suffer from a trade-off between ease of implementation (avoiding the need for global phase locking) and high rates (quadratic improvement in rate).
Pei Zeng   +3 more
doaj   +2 more sources

Phase-Matching Quantum Key Distribution [PDF]

open access: yesPhysical Review X, 2018
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information ...
Xiongfeng Ma, Pei Zeng, Hongyi Zhou
doaj   +5 more sources

A Key Verification Protocol for Quantum Key Distribution [PDF]

open access: yesIEEE Access, 2019
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques.
Gunes Karabulut Kurt   +3 more
doaj   +5 more sources

Receiver-Device-Independent Quantum Key Distribution [PDF]

open access: yesQuantum, 2022
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box.
Marie Ioannou   +11 more
doaj   +1 more source

Quantum Key Distribution Networks: Challenges and Future Research Issues in Security

open access: yesApplied Sciences, 2021
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical ...
Chia-Wei Tsai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy