Results 71 to 80 of about 929,226 (361)

Daylight entanglement-based quantum key distribution with a quantum dot source [PDF]

open access: yesQuantum Science and Technology, 2022
Entanglement-based quantum key distribution can enable secure communication in trusted node-free networks and over long distances. Although implementations exist both in fiber and in free space, the latter approach is often considered challenging due to ...
F. Basso Basset   +15 more
semanticscholar   +1 more source

Quantum and Semi–Quantum key Distribution in Networks

open access: yesInternational Journal of Theoretical Physics, 2023
In this paper, we utilize the potential offered by multidimensional separable states (MSS) for secure and simultaneous distributions of keys in a layered network. We present protocols for both quantum and semi-quantum key distribution and discuss their robustness against various eavesdropping strategies. We provide a procedure to identify the requisite
Bala, Rajni   +2 more
openaire   +2 more sources

Practical issues of twin-field quantum key distribution

open access: yesNew Journal of Physics, 2019
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu   +10 more
doaj   +1 more source

Higher-rate relativistic quantum key distribution

open access: yesScientific Reports, 2021
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key ...
Georgi Bebrov
doaj   +1 more source

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2015
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang   +6 more
doaj   +1 more source

Loophole-free plug-and-play quantum key distribution

open access: yesNew Journal of Physics, 2021
Robust, simple, and flexible quantum key distribution (QKD) is vital for realizing practical applications of this technique. Contrary to typical phase-coded QKD schemes, the plug-and-play QKD design requires only one arm-length-insensitive interferometer
Ruoyang Qi   +4 more
doaj   +1 more source

Secure quantum key distribution with realistic devices

open access: yes, 2020
Some years ago quantum hacking became popular: devices implementing the unbreakable quantum cryptography were shown to have imperfections which could be exploited by attackers.
Feihu Xu   +4 more
semanticscholar   +1 more source

Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits

open access: yesIEEE Access, 2017
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj   +1 more source

Receiver-device-independent quantum key distribution protocols

open access: yesNew Journal of Physics, 2022
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou   +5 more
doaj   +1 more source

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

open access: yesEntropy, 2018
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj   +1 more source

Home - About - Disclaimer - Privacy