Results 31 to 40 of about 951,489 (363)
Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks ...
Jie Jia +4 more
doaj +1 more source
Advances in device-independent quantum key distribution [PDF]
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only does it allow for information-theoretic security based on quantum mechanics, but it also relaxes the need to physically model the devices ...
Víctor Zapatero +6 more
semanticscholar +1 more source
Chaotic Quantum Key Distribution
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched.
Noah Cowper, Harry Shaw, David Thayer
doaj +1 more source
High-rate intercity quantum key distribution with a semiconductor single-photon source. [PDF]
Quantum key distribution (QKD) enables the transmission of information that is secure against general attacks by eavesdroppers. The use of on-demand quantum light sources in QKD protocols is expected to help improve security and maximum tolerable loss ...
Yang J +15 more
europepmc +3 more sources
Quantum dense key distribution [PDF]
This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present ...
DEGIOVANNI, IVO PIETRO +6 more
openaire +4 more sources
Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation [PDF]
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation,
Aur'elie Denys +2 more
semanticscholar +1 more source
Quantum cryptography beyond quantum key distribution [PDF]
45 pages, over 245 ...
Broadbent, A., Schaffner, C.
openaire +5 more sources
A device-independent quantum key distribution system for distant users [PDF]
Device-independent quantum key distribution (DIQKD) enables the generation of secret keys over an untrusted channel using uncharacterized and potentially untrusted devices1–9.
Wei Zhang +10 more
semanticscholar +1 more source
The security of practical quantum key distribution [PDF]
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
V. Scarani +5 more
semanticscholar +1 more source
Simple proof of security of the BB84 quantum key distribution protocol [PDF]
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of ...
P. Shor, J. Preskill
semanticscholar +1 more source

