Results 41 to 50 of about 460,882 (215)
Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation
Quantum cryptography is a topic of considerable interest. A simple and robust experiment and theory for a senior level undergraduate investigation of quantum key distribution are described.
Yuval Bloom+3 more
doaj +1 more source
Quantum key distribution with untrusted detectors [PDF]
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality
Lorena Rebón+10 more
openaire +5 more sources
Receiver-device-independent quantum key distribution protocols
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou+5 more
doaj +1 more source
Quantum and Semi–Quantum key Distribution in Networks
In this paper, we utilize the potential offered by multidimensional separable states (MSS) for secure and simultaneous distributions of keys in a layered network. We present protocols for both quantum and semi-quantum key distribution and discuss their robustness against various eavesdropping strategies. We provide a procedure to identify the requisite
Bala, Rajni+2 more
openaire +2 more sources
Practical issues of twin-field quantum key distribution
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu+10 more
doaj +1 more source
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj +1 more source
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang+6 more
doaj +1 more source
Zero-error attack against coherent-one-way quantum key distribution
Coherent-one-way (COW) quantum key distribution (QKD) held the promise of distributing secret keys over long distances with a simple experimental setup. Indeed, this scheme is currently used in commercial applications.
Róbert Trényi, Marcos Curty
doaj +1 more source
Increasing the Protocol Gain of Quantum Cryptography [PDF]
Quantum cryptography is a technique to distribute a sequence of truly random and unconditionally secure bits over a secure communication by applying the phenomena of quantum physics.
Firas Ali Sabir Al-Juboori+2 more
doaj +1 more source
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj +1 more source