Results 21 to 30 of about 1,030,100 (373)

Receiver-Device-Independent Quantum Key Distribution [PDF]

open access: yesQuantum, 2022
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box.
Marie Ioannou   +11 more
doaj   +1 more source

Quantum Key Distribution [PDF]

open access: yesACM Computing Surveys, 2020
The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds. The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first application on a broader scale.
Miralem Mehic   +10 more
  +6 more sources

Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance. [PDF]

open access: yesPhysical Review Letters, 2023
Quantum key distribution (QKD) aims to generate secure private keys shared by two remote parties. With its security being protected by principles of quantum mechanics, some technology challenges remain towards practical application of QKD.
Yang Liu   +17 more
semanticscholar   +1 more source

Continuous-variable quantum key distribution system: Past, present, and future [PDF]

open access: yesApplied Physics Reviews, 2023
Quantum key distribution provides secure keys with information-theoretic security ensured by the principle of quantum mechanics. The continuous-variable version of quantum key distribution using coherent states offers the advantages of its compatibility ...
Yichen Zhang   +4 more
semanticscholar   +1 more source

Quantum Key Distribution Networks: Challenges and Future Research Issues in Security

open access: yesApplied Sciences, 2021
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical ...
Chia-Wei Tsai   +4 more
doaj   +1 more source

Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation [PDF]

open access: yesQuantum, 2021
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation,
Aurélie Denys   +2 more
semanticscholar   +1 more source

Quantum key distribution using deterministic single-photon sources over a field-installed fibre link [PDF]

open access: yesnpj Quantum Information, 2023
Quantum-dot-based single-photon sources are key assets for quantum information technology, supplying on-demand scalable quantum resources for computing and communication.
M. Zahidy   +14 more
semanticscholar   +1 more source

Quantum cryptography: Public key distribution and coin tossing [PDF]

open access: yesTheoretical Computer Science, 2014
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on
Charles H. Bennett, Gilles Brassard
semanticscholar   +1 more source

Security of device-independent quantum key distribution protocols: a review [PDF]

open access: yesQuantum, 2022
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security, as it can be performed securely with uncharacterised black-box devices.
I. W. Primaatmaja   +5 more
semanticscholar   +1 more source

Implementation Security in Quantum Key Distribution [PDF]

open access: yesAdvanced Quantum Technologies, 2023
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. Here, a succint review is provided on this topic, focusing on discrete‐
Víctor Zapatero   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy