Results 11 to 20 of about 1,260,747 (157)
Symmetric autocompensating quantum key distribution [PDF]
We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits.
Zachary Walton+4 more
openalex +3 more sources
Decoy State Quantum Key Distribution [PDF]
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all
Hoi‐Kwong Lo, Xiongfeng Ma, Kai Chen
openalex +3 more sources
Qutrit-based semi-quantum key distribution protocol [PDF]
This article provides the unconditional security of a semi quantum key distribution (SQKD) protocol based on 3-dimensional quantum states. By deriving a lower bound for the key rate, in the asymptotic scenario, as a function of the quantum channel's noise, we find that this protocol has improved secret key rate with much more tolerance for noise ...
arxiv +1 more source
Quantum key distribution with post-processing driven by physical unclonable functions [PDF]
Quantum key-distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share beforehand a short secret key. This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data that have been obtained
arxiv +1 more source
Quantum Key Distribution [PDF]
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction
Chan, Philip+3 more
core +2 more sources
Layered Quantum Key Distribution [PDF]
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of ...
Huber, Marcus+2 more
core +2 more sources
Information Reconciliation for High-Dimensional Quantum Key Distribution using Nonbinary LDPC codes [PDF]
Information Reconciliation is an essential part of Quantum Key distribution protocols that closely resembles Slepian-Wolf coding. The application of nonbinary LDPC codes in the Information Reconciliation stage of a high-dimensional discrete-variable Quantum Key Distribution setup is proposed.
arxiv +1 more source
Comment on "Quantum Key Distribution with Classical Bob" [PDF]
In this comment, we present a frequency-shift attack on "quantum key distribution with classical Bob". This practical attack should also be considered in other two-way quantum key distribution protocols.
arxiv +1 more source
Free-space quantum key distribution [PDF]
A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions.
Buttler, W. T.+7 more
core +2 more sources
Quantum key distribution protocol based on contextuality monogamy [PDF]
The security of quantum key distribution protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness as qualified by quantum contextuality, in quantum key distribution schemes. We present a new quantum key distribution protocol whose security depends uponthe KCBS inequality and ...
arxiv +1 more source