Results 101 to 110 of about 1,030,100 (373)

Quantum key distribution without the wavefunction [PDF]

open access: yes, 2016
A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a
Niestegge, Gerd
core   +3 more sources

Quantum Key Distribution in the Holevo Limit [PDF]

open access: yesPhysical Review Letters, 2000
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for quantum key distribution, $\cal E$, defined as the number of secret (i.e., allowing eavesdropping detection) bits per transmitted bit plus qubit, is ${\cal E} \le 1$. The problem addressed here is whether the limit ${\cal E} =1$ can be achieved. It is showed that
openaire   +5 more sources

Fully Passive Quantum Key Distribution

open access: yesPhysical Review Letters, 2023
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed.
Wang, Wenyuan   +7 more
openaire   +3 more sources

Influence of an Argon/Silane Atmosphere on the Temperature of a Thermal Plasma

open access: yesAdvanced Engineering Materials, EarlyView.
The influence of a silane‐doped argon atmosphere on the chemical composition and temperature of a thermal nontransferring argon plasma is investigated using optical emission spectroscopy. As a result of the high amount of free electrons resulting from the stepwise ionization and dissociation of the silane molecule, even a silane addition of 0.01 vol ...
Lena Kreie   +4 more
wiley   +1 more source

DECOY STATE QUANTUM KEY DISTRIBUTION

open access: yesInternational Islamic University Malaysia Engineering Journal, 2010
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to ...
Sellami Ali
doaj   +1 more source

Key-Recycling Strategies in Quantum-Key-Distribution Networks

open access: yesApplied Sciences, 2020
Quantum-key-distribution (QKD) networks can provide absolutely secure keys for the entire communication system in theory. At present, the key-distribution rate is relatively low, and the key-distribution rate decreases exponentially as the distribution ...
Xinying Li   +4 more
doaj   +1 more source

Applying Gaussian quantum discord to quantum key distribution

open access: yes, 2014
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core   +1 more source

Dielectric Barrier Discharge Plasma Deoxidation of Natively Oxide Layer of Copper Powders in a Fluidized Bed

open access: yesAdvanced Engineering Materials, EarlyView.
This paper presents a novel approach to reducing oxide layers on metal powders using low‐temperature hydrogen dielectric barrier discharge plasmas at atmospheric pressure. Unlike conventional hydrogen‐plasma reductions, the powders do not contact the plasma directly.
Shukang Zhang   +3 more
wiley   +1 more source

End-to-End Entanglement Generation Strategies: Capacity Bounds and Impact on Quantum Key Distribution

open access: yesQuantum Reports, 2022
A first quantum revolution has already brought quantum technologies into our everyday life for decades: in fact, electronics and optics are based on the quantum mechanical principles. Today, a second quantum revolution is underway, leveraging the quantum
Antonio Manzalini, Michele Amoretti
doaj   +1 more source

Completely Device Independent Quantum Key Distribution

open access: yes, 2016
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme.
Aguilar, E. A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy