Results 31 to 40 of about 929,226 (361)

Quantum Key Distribution in the Holevo Limit [PDF]

open access: yesPhysical Review Letters, 2000
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for quantum key distribution, $\cal E$, defined as the number of secret (i.e., allowing eavesdropping detection) bits per transmitted bit plus qubit, is ${\cal E} \le 1$. The problem addressed here is whether the limit ${\cal E} =1$ can be achieved. It is showed that
Cabello, Adan
openaire   +8 more sources

Quantum key distribution without sending a quantum signal [PDF]

open access: yesNew Journal of Physics, 2015
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical
T C Ralph, N Walk
doaj   +3 more sources

A Key Verification Protocol for Quantum Key Distribution [PDF]

open access: yesIEEE Access, 2019
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques.
Gunes Karabulut Kurt   +3 more
doaj   +5 more sources

Comment on “Quantum dense key distribution” [PDF]

open access: yesPhysical Review A, 2005
In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.
Antoni Wójcik, C. H. Bennett
openaire   +4 more sources

Symmetric autocompensating quantum key distribution [PDF]

open access: green, 2004
We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits.
Zachary Walton   +4 more
openalex   +3 more sources

Receiver-Device-Independent Quantum Key Distribution [PDF]

open access: yesQuantum, 2022
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box.
Marie Ioannou   +11 more
doaj   +1 more source

Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance. [PDF]

open access: yesPhysical Review Letters, 2023
Quantum key distribution (QKD) aims to generate secure private keys shared by two remote parties. With its security being protected by principles of quantum mechanics, some technology challenges remain towards practical application of QKD.
Yang Liu   +17 more
semanticscholar   +1 more source

Continuous-variable quantum key distribution system: Past, present, and future [PDF]

open access: yesApplied Physics Reviews, 2023
Quantum key distribution provides secure keys with information-theoretic security ensured by the principle of quantum mechanics. The continuous-variable version of quantum key distribution using coherent states offers the advantages of its compatibility ...
Yichen Zhang   +4 more
semanticscholar   +1 more source

Quantum key distribution using deterministic single-photon sources over a field-installed fibre link [PDF]

open access: yesnpj Quantum Information, 2023
Quantum-dot-based single-photon sources are key assets for quantum information technology, supplying on-demand scalable quantum resources for computing and communication.
M. Zahidy   +14 more
semanticscholar   +1 more source

Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron Nitride [PDF]

open access: yesAdvanced Quantum Technologies, 2023
Quantum key distribution (QKD) is considered the most immediate application to be widely implemented among a variety of potential quantum technologies. QKD enables sharing secret keys between distant users by using photons as information carriers.
Ali Al-Juboori   +8 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy