Results 51 to 60 of about 1,699,812 (377)
40-user fully connected entanglement-based quantum key distribution network without trusted node
Quantum key distribution (QKD) would play an important role in future information technologies due to its theoretically proven security based on the laws of quantum mechanics.
Xu Liu+11 more
doaj +1 more source
Quantum cryptography beyond quantum key distribution [PDF]
45 pages, over 245 ...
Broadbent, A., Schaffner, C.
openaire +7 more sources
Quantum key distribution with correlated sources [PDF]
A security framework enables practical quantum key distribution realizations even with correlated and generally flawed sources.
Pereira, Margarida+4 more
openaire +4 more sources
Quantum key distribution with post-processing driven by physical unclonable functions [PDF]
Quantum key-distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share beforehand a short secret key. This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data that have been obtained
arxiv +1 more source
Zero-error attack against coherent-one-way quantum key distribution
Coherent-one-way (COW) quantum key distribution (QKD) held the promise of distributing secret keys over long distances with a simple experimental setup. Indeed, this scheme is currently used in commercial applications.
Róbert Trényi, Marcos Curty
doaj +1 more source
SECURITY OF QUANTUM KEY DISTRIBUTION [PDF]
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition.
openaire +2 more sources
A fully passive transmitter for decoy-state quantum key distribution [PDF]
A passive quantum key distribution (QKD) transmitter generates the quantum states prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post-selection step.
Víctor Zapatero, Wenyuan Wang, M. Curty
semanticscholar +1 more source
Increasing the Protocol Gain of Quantum Cryptography [PDF]
Quantum cryptography is a technique to distribute a sequence of truly random and unconditionally secure bits over a secure communication by applying the phenomena of quantum physics.
Firas Ali Sabir Al-Juboori+2 more
doaj +1 more source
Measurement-device-independent quantum key distribution. [PDF]
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum key distribution (QKD).
H. Lo, M. Curty, B. Qi
semanticscholar +1 more source
Practical continuous-variable quantum key distribution with composable security [PDF]
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure.
N. Jain+12 more
semanticscholar +1 more source