Results 71 to 80 of about 460,882 (215)
Quantum repeaters and quantum key distribution: analysis of secret key rates
We analyze various prominent quantum repeater protocols in the context of long-distance quantum key distribution. These protocols are the original quantum repeater proposal by Briegel, D\"ur, Cirac and Zoller, the so-called hybrid quantum repeater using ...
C. H. Bennett+12 more
core +1 more source
Quantum key distribution using unknown quantum states
This paper proposes a version of quantum key distribution (QKD) by leveraging unknown quantum states. The measurement made on the unknown quantum states is independent of them.
Da-Wei Guo, Wen-Hai Zhang
doaj +1 more source
Semiquantum key distribution [PDF]
13 pages, 2 ...
Ran Gelles+3 more
openaire +3 more sources
Numerical finite-key analysis of quantum key distribution
Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments,
Darius Bunandar+3 more
doaj +1 more source
Quantum digital signatures with quantum-key-distribution components [PDF]
13 pages. In v2 we included the first proof of security of a QDS protocol against coherent forging attacks.
Vedran Dunjko+6 more
openaire +6 more sources
Applying Gaussian quantum discord to quantum key distribution
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core +1 more source
Passive Decoy-State Quantum Key Distribution with Coherent Light
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates,
Marcos Curty+3 more
doaj +1 more source
Quantum key distribution with 2-bit quantum codes
We propose a prepare-and-measure scheme for quantum key distribution with 2-bit quantum codes. The protocol is unconditionally secure under whatever type of intercept-and-resend attack. Given the symmetric and independent errors to the transmitted qubits,
A. M. Steane+5 more
core +1 more source
Detector-Device-Independent Quantum Key Distribution
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix+5 more
core +1 more source
Memory-assisted measurement-device-independent quantum key distribution
A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement ...
Christiana Panayi+3 more
doaj +1 more source