Results 101 to 110 of about 1,030,100 (373)
Quantum key distribution without the wavefunction [PDF]
A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a
Niestegge, Gerd
core +3 more sources
Quantum Key Distribution in the Holevo Limit [PDF]
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for quantum key distribution, $\cal E$, defined as the number of secret (i.e., allowing eavesdropping detection) bits per transmitted bit plus qubit, is ${\cal E} \le 1$. The problem addressed here is whether the limit ${\cal E} =1$ can be achieved. It is showed that
openaire +5 more sources
Fully Passive Quantum Key Distribution
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed.
Wang, Wenyuan +7 more
openaire +3 more sources
Influence of an Argon/Silane Atmosphere on the Temperature of a Thermal Plasma
The influence of a silane‐doped argon atmosphere on the chemical composition and temperature of a thermal nontransferring argon plasma is investigated using optical emission spectroscopy. As a result of the high amount of free electrons resulting from the stepwise ionization and dissociation of the silane molecule, even a silane addition of 0.01 vol ...
Lena Kreie +4 more
wiley +1 more source
DECOY STATE QUANTUM KEY DISTRIBUTION
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to ...
Sellami Ali
doaj +1 more source
Key-Recycling Strategies in Quantum-Key-Distribution Networks
Quantum-key-distribution (QKD) networks can provide absolutely secure keys for the entire communication system in theory. At present, the key-distribution rate is relatively low, and the key-distribution rate decreases exponentially as the distribution ...
Xinying Li +4 more
doaj +1 more source
Applying Gaussian quantum discord to quantum key distribution
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core +1 more source
This paper presents a novel approach to reducing oxide layers on metal powders using low‐temperature hydrogen dielectric barrier discharge plasmas at atmospheric pressure. Unlike conventional hydrogen‐plasma reductions, the powders do not contact the plasma directly.
Shukang Zhang +3 more
wiley +1 more source
A first quantum revolution has already brought quantum technologies into our everyday life for decades: in fact, electronics and optics are based on the quantum mechanical principles. Today, a second quantum revolution is underway, leveraging the quantum
Antonio Manzalini, Michele Amoretti
doaj +1 more source
Completely Device Independent Quantum Key Distribution
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme.
Aguilar, E. A. +3 more
core +1 more source

