Results 111 to 120 of about 1,010,511 (221)
Hands-On Quantum Cryptography: Experimentation with the B92 Protocol Using Pulsed Lasers
Quantum cryptography continues to be an area of significant research and educational interest. Here, a straightforward and reliable approach to both the experimental and theoretical aspects of quantum key distribution is presented, tailored for senior ...
Sara P. Gandelman +2 more
doaj +1 more source
High-Dimensional Semiquantum Cryptography
A semiquantum key distribution (SQKD) protocol allows two users, one of whom is restricted in their quantum capabilities to being nearly classical, to establish a shared secret key, secure against an all-powerful adversary.
Hasan Iqbal, Walter O. Krawec
doaj +1 more source
Memory-assisted measurement-device-independent quantum key distribution
A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement ...
Christiana Panayi +3 more
doaj +1 more source
Simple method for asymmetric twin-field quantum key distribution
Twin-field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to prove its security.
Wenyuan Wang, Hoi-Kwong Lo
doaj +1 more source
Quantum Key Distribution over Probabilistic Quantum Repeaters
A feasible route towards implementing long-distance quantum key distribution (QKD) systems relies on probabilistic schemes for entanglement distribution and swapping as proposed in the work of Duan, Lukin, Cirac, and Zoller (DLCZ) [Nature 414, 413 (2001)]
A. Hamed Majedi +4 more
core +1 more source
On the (relation between) efficiency and secret key rate of QKD
The processes of evaluation and comparison play a vital role in the development of a scientific field. In the field of quantum cryptography (especially quantum key distribution, QKD), the so-called secret key rate is used for characterizing the ...
Georgi Bebrov
doaj +1 more source
Finite-key security against coherent attacks in quantum key distribution
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A +9 more
core +1 more source
Entanglement-enhanced quantum key distribution
We present and analyze a quantum key distribution protocol based on sending entangled N-qubit states instead of single-qubit ones as in the trail-blazing scheme by Bennett and Brassard (BB84). Since the qubits are sent individually, an eavesdropper is limited to accessing them one by one.
Ahone, O, Mottonen, M, O'Brien, JL
openaire +3 more sources
The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes.
Sarah J Johnson +5 more
doaj +1 more source
Towards global quantum key distribution
Quantum Key Distribution (QKD) supports the negotiation and sharing of private keys with unconditional security between authorized parties. Over the years, theoretical advances and experimental demonstrations have successfully transitioned QKD from laboratory research to commercial applications.
Haoran Zhang +6 more
openaire +2 more sources

