Results 61 to 70 of about 1,010,511 (221)

Practical issues of twin-field quantum key distribution

open access: yesNew Journal of Physics, 2019
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu   +10 more
doaj   +1 more source

Higher-rate relativistic quantum key distribution

open access: yesScientific Reports, 2021
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key ...
Georgi Bebrov
doaj   +1 more source

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2015
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang   +6 more
doaj   +1 more source

Loophole-free plug-and-play quantum key distribution

open access: yesNew Journal of Physics, 2021
Robust, simple, and flexible quantum key distribution (QKD) is vital for realizing practical applications of this technique. Contrary to typical phase-coded QKD schemes, the plug-and-play QKD design requires only one arm-length-insensitive interferometer
Ruoyang Qi   +4 more
doaj   +1 more source

Quantum Key Distribution with Classical Bob [PDF]

open access: yes, 2007
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a
C. A. Fuchs   +6 more
core   +2 more sources

Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits

open access: yesIEEE Access, 2017
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj   +1 more source

Receiver-device-independent quantum key distribution protocols

open access: yesNew Journal of Physics, 2022
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou   +5 more
doaj   +1 more source

Experimental underwater quantum key distribution

open access: yesOptics Express, 2021
In recent years, the feasibility of quantum key distribution (QKD) in a water channel has been verified by theory and experiment. Here, we present an experimental investigation of QKD and decoy-state QKD based on the BB84 protocol. The experiment was carried out in a 10 m water tank. The attenuation coefficient of tap water is 0.08/m, which is close to
Zhao Feng, Shangbin Li, Zhengyuan Xu
openaire   +2 more sources

Device-independent quantum key distribution with asymmetric CHSH inequalities

open access: yesQuantum, 2021
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
E. Woodhead, A. Acín, Stefano Pironio
semanticscholar   +1 more source

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

open access: yesEntropy, 2018
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj   +1 more source

Home - About - Disclaimer - Privacy