Results 41 to 50 of about 513,576 (325)
A simple proof of the unconditional security of quantum key distribution [PDF]
Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties.
Ben-Or M +12 more
core +3 more sources
Satellite-based links for quantum key distribution: beam effects and weather dependence
The establishment of a world-wide quantum communication network relies on the synergistic integration of satellite-based links and fiber-based networks. The first are helpful for long-distance communication, as the photon losses introduced by the optical
Carlo Liorni +2 more
doaj +1 more source
ErB4 and NdB4 nanostructured powders are produced by mechanochemical synthesis. 5 h mechanical alloying and 4 M HCl acid leaching are used in the production. ErB4 and NdB4 powders exhibit maximum magnetization of 0.4726 emu g−1 accompanied with an antiferromagnetic‐to‐paramagnetic phase transition at about TN = 18 K and 0.132 emu g−1 with a maximum at ...
Burçak Boztemur +5 more
wiley +1 more source
Towards Communication-Efficient Quantum Oblivious Key Distribution [PDF]
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB_b in such a way that (1) Alice learns DB_b and ...
C. Crépeau +8 more
core +2 more sources
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu +8 more
wiley +1 more source
Reliable numerical key rates for quantum key distribution [PDF]
In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our approach by finding higher key rates than those previously reported in
Adam Winick +2 more
doaj +1 more source
AbstractA new class of computers, so-called quantum computers, will soon be able to crack common encryption algorithms. Quantum key distribution is a promising solution to stay secure in the age of the quantum computer, which is progressively getting industrialized in recent years.
openaire +1 more source
This article provides an overview of recent advancements in bulk processing of rare‐earth‐free hard magnetic materials. It also addresses related simulation approaches at different scales. The research on rare‐earth‐free magnetic materials has increased significantly in recent years, driven by supply chain issues, environmental and social concerns, and
Daniel Scheiber, Andrea Bachmaier
wiley +1 more source
Passive Decoy-State Quantum Key Distribution with Coherent Light
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates,
Marcos Curty +3 more
doaj +1 more source
Satellite-based measurement-device-independent quantum key distribution
A satellite-based measurement-device-independent quantum key distribution model is proposed and its performance is analyzed through numerical simulations.
Wentao Liang, Rongzhen Jiao
doaj +1 more source

