Results 31 to 40 of about 951,489 (363)

Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks

open access: yesEntropy, 2023
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks ...
Jie Jia   +4 more
doaj   +1 more source

Advances in device-independent quantum key distribution [PDF]

open access: yesnpj Quantum Information, 2022
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only does it allow for information-theoretic security based on quantum mechanics, but it also relaxes the need to physically model the devices ...
Víctor Zapatero   +6 more
semanticscholar   +1 more source

Chaotic Quantum Key Distribution

open access: yesCryptography, 2020
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched.
Noah Cowper, Harry Shaw, David Thayer
doaj   +1 more source

High-rate intercity quantum key distribution with a semiconductor single-photon source. [PDF]

open access: yesLight Sci Appl, 2023
Quantum key distribution (QKD) enables the transmission of information that is secure against general attacks by eavesdroppers. The use of on-demand quantum light sources in QKD protocols is expected to help improve security and maximum tolerable loss ...
Yang J   +15 more
europepmc   +3 more sources

Quantum dense key distribution [PDF]

open access: yesPhysical Review A, 2004
This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present ...
DEGIOVANNI, IVO PIETRO   +6 more
openaire   +4 more sources

Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation [PDF]

open access: yesQuantum, 2021
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation,
Aur'elie Denys   +2 more
semanticscholar   +1 more source

Quantum cryptography beyond quantum key distribution [PDF]

open access: yesDesigns, Codes and Cryptography, 2015
45 pages, over 245 ...
Broadbent, A., Schaffner, C.
openaire   +5 more sources

A device-independent quantum key distribution system for distant users [PDF]

open access: yesNature, 2021
Device-independent quantum key distribution (DIQKD) enables the generation of secret keys over an untrusted channel using uncharacterized and potentially untrusted devices1–9.
Wei Zhang   +10 more
semanticscholar   +1 more source

The security of practical quantum key distribution [PDF]

open access: yes, 2008
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
V. Scarani   +5 more
semanticscholar   +1 more source

Simple proof of security of the BB84 quantum key distribution protocol [PDF]

open access: yesPhysical Review Letters, 2000
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of ...
P. Shor, J. Preskill
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy