Results 61 to 70 of about 1,699,812 (377)
Thermal state quantum key distribution [PDF]
Abstract We analyse a central broadcast continuous variable quantum key distribution protocol in which a beam produced by a thermal source is used to create a secret key between two parties, Alice and Bob. A beam splitter divides the initial beam into a pair of output beams, which are sent to Alice and Bob, with Eve intercepting Bob’s ...
A Walton+4 more
openaire +6 more sources
Smart grid depends on an advanced communication network to collect information from the power grid, and to disseminate control commands to the control devices.
P. Kong
semanticscholar +1 more source
Information Reconciliation for High-Dimensional Quantum Key Distribution using Nonbinary LDPC codes [PDF]
Information Reconciliation is an essential part of Quantum Key distribution protocols that closely resembles Slepian-Wolf coding. The application of nonbinary LDPC codes in the Information Reconciliation stage of a high-dimensional discrete-variable Quantum Key Distribution setup is proposed.
arxiv +1 more source
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-
Norbert Lütkenhaus+3 more
openaire +4 more sources
A Review of Security Evaluation of Practical Quantum Key Distribution System
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key.
S. Sun, Anqi Huang
semanticscholar +1 more source
Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference [PDF]
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase ...
Yuan-Mei Xie+9 more
semanticscholar +1 more source
Comment on "Quantum Key Distribution with Classical Bob" [PDF]
In this comment, we present a frequency-shift attack on "quantum key distribution with classical Bob". This practical attack should also be considered in other two-way quantum key distribution protocols.
arxiv +1 more source
Twin-field quantum key distribution with passive-decoy state
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. phase-maching QKD, sending-or-not-sending QKD, and no phase post-selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater.
Jun Teng+10 more
doaj +1 more source
Daylight entanglement-based quantum key distribution with a quantum dot source [PDF]
Entanglement-based quantum key distribution can enable secure communication in trusted node-free networks and over long distances. Although implementations exist both in fiber and in free space, the latter approach is often considered challenging due to ...
F. Basso Basset+15 more
semanticscholar +1 more source
Quantum key distribution protocol based on contextuality monogamy [PDF]
The security of quantum key distribution protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness as qualified by quantum contextuality, in quantum key distribution schemes. We present a new quantum key distribution protocol whose security depends uponthe KCBS inequality and ...
arxiv +1 more source