Results 21 to 30 of about 408,274 (226)

Quantum key distribution with correlated sources [PDF]

open access: yesScience Advances, 2020
A security framework enables practical quantum key distribution realizations even with correlated and generally flawed sources.
Pereira, Margarida   +4 more
openaire   +4 more sources

SECURITY OF QUANTUM KEY DISTRIBUTION [PDF]

open access: yesInternational Journal of Quantum Information, 2008
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition.
openaire   +2 more sources

Fully Passive Quantum Key Distribution

open access: yesPhysical Review Letters, 2023
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed.
Wang, Wenyuan   +7 more
openaire   +3 more sources

Quantum Key Distribution Using Quantum Faraday Rotators [PDF]

open access: yes, 2007
We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against collective attacks for multi-photon source up to two photons on a noisy ...
Bae J Acin A   +6 more
core   +1 more source

Thermal state quantum key distribution [PDF]

open access: yesJournal of Physics B: Atomic, Molecular and Optical Physics, 2021
Abstract We analyse a central broadcast continuous variable quantum key distribution protocol in which a beam produced by a thermal source is used to create a secret key between two parties, Alice and Bob. A beam splitter divides the initial beam into a pair of output beams, which are sent to Alice and Bob, with Eve intercepting Bob’s ...
A Walton   +4 more
openaire   +6 more sources

Chip-based quantum key distribution [PDF]

open access: yesNature Communications, 2017
AbstractImprovement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems.
Sibson, P.   +12 more
openaire   +7 more sources

Quantum key distribution with untrusted detectors [PDF]

open access: yesPhysical Review A, 2015
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality
Lorena Rebón   +10 more
openaire   +5 more sources

Quantum Key Distribution without sending a Quantum Signal [PDF]

open access: yes, 2014
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical
Ralph, T. C., Walk, N.
core   +2 more sources

Quantum and Semi–Quantum key Distribution in Networks

open access: yesInternational Journal of Theoretical Physics, 2023
In this paper, we utilize the potential offered by multidimensional separable states (MSS) for secure and simultaneous distributions of keys in a layered network. We present protocols for both quantum and semi-quantum key distribution and discuss their robustness against various eavesdropping strategies. We provide a procedure to identify the requisite
Bala, Rajni   +2 more
openaire   +2 more sources

A Key Verification Protocol for Quantum Key Distribution [PDF]

open access: yesIEEE Access, 2019
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques. In the presence of an eavesdropper, Alice's key may not be identical with Bob's key, due to the characteristics of a quantum channel.
Gunes Karabulut Kurt   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy