Results 1 to 10 of about 408,274 (226)
Decoy State Quantum Key Distribution [PDF]
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all
Chen, Kai, Lo, Hoi-Kwong, Ma, Xiongfeng
core +6 more sources
Secure Quantum Key Distribution [PDF]
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos+2 more
core +2 more sources
Quantum Key Distribution [PDF]
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction
Chan, Philip+3 more
core +5 more sources
Layered Quantum Key Distribution [PDF]
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of ...
Huber, Marcus+2 more
core +4 more sources
Security of Quantum Key Distribution
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core +4 more sources
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon+20 more
core +11 more sources
A Proof of the Security of Quantum Key Distribution [PDF]
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics.
Eli Biham+4 more
openalex +6 more sources
Quantum Kolmogorov Complexity and Quantum Key Distribution [PDF]
We discuss the Bennett-Brassard 1984 (BB84) quantum key distribution protocol in the light of quantum algorithmic information. While Shannon's information theory needs a probability to define a notion of information, algorithmic information theory does ...
A. N. Kolmogorov+9 more
core +3 more sources
Quantum key distribution via quantum encryption [PDF]
A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key.
A. Cabello+24 more
core +2 more sources
Symmetric Autocompensating Quantum Key Distribution [PDF]
We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits.
Levitin, Lev B.+4 more
core +2 more sources