Results 71 to 80 of about 929,226 (361)
Daylight entanglement-based quantum key distribution with a quantum dot source [PDF]
Entanglement-based quantum key distribution can enable secure communication in trusted node-free networks and over long distances. Although implementations exist both in fiber and in free space, the latter approach is often considered challenging due to ...
F. Basso Basset +15 more
semanticscholar +1 more source
Quantum and Semi–Quantum key Distribution in Networks
In this paper, we utilize the potential offered by multidimensional separable states (MSS) for secure and simultaneous distributions of keys in a layered network. We present protocols for both quantum and semi-quantum key distribution and discuss their robustness against various eavesdropping strategies. We provide a procedure to identify the requisite
Bala, Rajni +2 more
openaire +2 more sources
Practical issues of twin-field quantum key distribution
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu +10 more
doaj +1 more source
Higher-rate relativistic quantum key distribution
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key ...
Georgi Bebrov
doaj +1 more source
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang +6 more
doaj +1 more source
Loophole-free plug-and-play quantum key distribution
Robust, simple, and flexible quantum key distribution (QKD) is vital for realizing practical applications of this technique. Contrary to typical phase-coded QKD schemes, the plug-and-play QKD design requires only one arm-length-insensitive interferometer
Ruoyang Qi +4 more
doaj +1 more source
Secure quantum key distribution with realistic devices
Some years ago quantum hacking became popular: devices implementing the unbreakable quantum cryptography were shown to have imperfections which could be exploited by attackers.
Feihu Xu +4 more
semanticscholar +1 more source
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj +1 more source
Receiver-device-independent quantum key distribution protocols
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou +5 more
doaj +1 more source
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj +1 more source

