Results 21 to 30 of about 1,010,511 (221)
Quantum key distribution using deterministic single-photon sources over a field-installed fibre link [PDF]
Quantum-dot-based single-photon sources are key assets for quantum information technology, supplying on-demand scalable quantum resources for computing and communication.
M. Zahidy +14 more
semanticscholar +1 more source
Fully Passive Quantum Key Distribution
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed.
Wang, Wenyuan +7 more
openaire +3 more sources
Quantum cryptography: Public key distribution and coin tossing [PDF]
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on
Charles H. Bennett, Gilles Brassard
semanticscholar +1 more source
Security of device-independent quantum key distribution protocols: a review [PDF]
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security, as it can be performed securely with uncharacterised black-box devices.
I. W. Primaatmaja +5 more
semanticscholar +1 more source
Quantum dense key distribution [PDF]
This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present ...
DEGIOVANNI, IVO PIETRO +6 more
openaire +4 more sources
Implementation Security in Quantum Key Distribution [PDF]
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. Here, a succint review is provided on this topic, focusing on discrete‐
Víctor Zapatero +2 more
semanticscholar +1 more source
Chip-based quantum key distribution
Quantum key distribution is a matured quantum science and technology. Over the last 20 years, there has been substantial research and development in this area.
Leong-Chuan Kwek +6 more
doaj +1 more source
Quantum cryptography beyond quantum key distribution [PDF]
45 pages, over 245 ...
Broadbent, A., Schaffner, C.
openaire +5 more sources
Simple proof of security of the BB84 quantum key distribution protocol [PDF]
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of ...
P. Shor, J. Preskill
semanticscholar +1 more source
Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks ...
Jie Jia +4 more
doaj +1 more source

