Results 61 to 70 of about 1,030,100 (373)
Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference [PDF]
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase ...
Yuan-Mei Xie +9 more
semanticscholar +1 more source
Zero-error attack against coherent-one-way quantum key distribution
Coherent-one-way (COW) quantum key distribution (QKD) held the promise of distributing secret keys over long distances with a simple experimental setup. Indeed, this scheme is currently used in commercial applications.
Róbert Trényi, Marcos Curty
doaj +1 more source
Practical continuous-variable quantum key distribution with composable security [PDF]
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure.
N. Jain +12 more
semanticscholar +1 more source
Increasing the Protocol Gain of Quantum Cryptography [PDF]
Quantum cryptography is a technique to distribute a sequence of truly random and unconditionally secure bits over a secure communication by applying the phenomena of quantum physics.
Firas Ali Sabir Al-Juboori +2 more
doaj +1 more source
Detector decoy quantum key distribution [PDF]
Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold ...
Bazaraa M S +25 more
core +1 more source
Phase-Matching Quantum Key Distribution
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information ...
Xiongfeng Ma, Pei Zeng, Hongyi Zhou
doaj +1 more source
Security of quantum key distribution with intensity correlations [PDF]
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources.
Víctor Zapatero +3 more
semanticscholar +1 more source
Continuous-mode quantum key distribution with digital signal processing [PDF]
Continuous-variable quantum key distribution (CVQKD) offers the specific advantage of sharing keys remotely by the use of standard telecom components, thereby promoting cost-effective and high-performance metropolitan applications.
Ziyang Chen +4 more
semanticscholar +1 more source
Practical issues of twin-field quantum key distribution
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu +10 more
doaj +1 more source
Higher-rate relativistic quantum key distribution
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key ...
Georgi Bebrov
doaj +1 more source

