Results 11 to 20 of about 1,699,812 (377)
Quantum key distribution with quantum walks [PDF]
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification
Chrysoula Vlachou+4 more
arxiv +6 more sources
Implementation Security in Quantum Key Distribution [PDF]
AbstractThe problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. Here, a succint review is provided on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero+2 more
openaire +4 more sources
Chip-based quantum key distribution
Quantum key distribution is a matured quantum science and technology. Over the last 20 years, there has been substantial research and development in this area.
Leong-Chuan Kwek+6 more
doaj +2 more sources
No Signalling and Quantum Key Distribution [PDF]
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key ...
A. Kent+9 more
core +3 more sources
A Proof of the Security of Quantum Key Distribution [PDF]
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics.
Eli Biham+4 more
openalex +6 more sources
Satellite-to-ground quantum key distribution [PDF]
18 pages, 4 ...
Jianfeng Wang+35 more
openaire +6 more sources
Fully Passive Quantum Key Distribution [PDF]
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed.
Wenyuan Wang+7 more
openaire +4 more sources
Twin-field quantum key distribution without optical frequency dissemination. [PDF]
Twin-field (TF) quantum key distribution (QKD) has rapidly risen as the most viable solution to long-distance secure fibre communication thanks to its fundamentally repeater-like rate-loss scaling.
Zhou L, Lin J, Jing Y, Yuan Z.
europepmc +3 more sources
Quantum key distribution without alternative measurements [PDF]
Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described.
Adán Cabello
openalex +3 more sources
Quantum Kolmogorov Complexity and Quantum Key Distribution [PDF]
We discuss the Bennett-Brassard 1984 (BB84) quantum key distribution protocol in the light of quantum algorithmic information. While Shannon's information theory needs a probability to define a notion of information, algorithmic information theory does ...
A. N. Kolmogorov+9 more
core +3 more sources