Results 331 to 340 of about 929,226 (361)
Some of the next articles are maybe not open access.
2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai +2 more
openaire +2 more sources
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai +2 more
openaire +2 more sources
Quantum key distribution with a control key
2017 International Symposium on Wireless Communication Systems (ISWCS), 2017Quantum key distribution (QKD) relies on randomness to exchange secret keys among the communicating parties. While ensuring the secrecy of the keys being distributed, independent randomness also causes to reduce the number of key bits that can be shared per quantum signal exchanged.
Youngmin Jeong +2 more
openaire +2 more sources
Quantum Key Distribution [PDF]
Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.
openaire +1 more source
Key reconciliation in quantum key distribution
IEE Seminar on Quantum Cryptography: Secure Communications, 2005This paper presents a slide presentation on the key reconciliation in quantum key distribution. The classical communication, error correction protocols, and performance comparison are included in the presentation. (20 pages)
P. Gronberg, P. Jonsson
openaire +2 more sources
Quantum Computing: Quantum Key Distribution [PDF]
For the last fifty years computers have grown faster, smaller, and more powerful transforming and benefiting our society in ways too numerous to count. But like any exponential explosion of resources, this growth — known as Moore's law — must soon come to an end. Research has already begun on what comes after our current computing revolution.
openaire +1 more source
2014
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +2 more sources
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +2 more sources
Circular mediated semi-quantum key distribution
Quantum Information Processing, 2023Chongqiang Ye +5 more
semanticscholar +1 more source
Decoy-state method for quantum-key-distribution-based quantum private query
Science China Physics Mechanics and Astronomy, 2022B. Liu +5 more
semanticscholar +1 more source
Quantum guidelines for solid-state spin defects
Nature Reviews Materials, 2021Gary Wolfowicz +2 more
exaly
Weyl, Dirac and high-fold chiral fermions in topological quantum matter
Nature Reviews Materials, 2021M Zahid Hasan +2 more
exaly

