Results 71 to 80 of about 460,882 (215)

Quantum repeaters and quantum key distribution: analysis of secret key rates

open access: yes, 2013
We analyze various prominent quantum repeater protocols in the context of long-distance quantum key distribution. These protocols are the original quantum repeater proposal by Briegel, D\"ur, Cirac and Zoller, the so-called hybrid quantum repeater using ...
C. H. Bennett   +12 more
core   +1 more source

Quantum key distribution using unknown quantum states

open access: yesAIP Advances
This paper proposes a version of quantum key distribution (QKD) by leveraging unknown quantum states. The measurement made on the unknown quantum states is independent of them.
Da-Wei Guo, Wen-Hai Zhang
doaj   +1 more source

Semiquantum key distribution [PDF]

open access: yesPhysical Review A, 2009
13 pages, 2 ...
Ran Gelles   +3 more
openaire   +3 more sources

Numerical finite-key analysis of quantum key distribution

open access: yesnpj Quantum Information, 2020
Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments,
Darius Bunandar   +3 more
doaj   +1 more source

Quantum digital signatures with quantum-key-distribution components [PDF]

open access: yesPhysical Review A, 2015
13 pages. In v2 we included the first proof of security of a QDS protocol against coherent forging attacks.
Vedran Dunjko   +6 more
openaire   +6 more sources

Applying Gaussian quantum discord to quantum key distribution

open access: yes, 2014
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core   +1 more source

Passive Decoy-State Quantum Key Distribution with Coherent Light

open access: yesEntropy, 2015
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates,
Marcos Curty   +3 more
doaj   +1 more source

Quantum key distribution with 2-bit quantum codes

open access: yes, 2004
We propose a prepare-and-measure scheme for quantum key distribution with 2-bit quantum codes. The protocol is unconditionally secure under whatever type of intercept-and-resend attack. Given the symmetric and independent errors to the transmitted qubits,
A. M. Steane   +5 more
core   +1 more source

Detector-Device-Independent Quantum Key Distribution

open access: yes, 2014
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix   +5 more
core   +1 more source

Memory-assisted measurement-device-independent quantum key distribution

open access: yesNew Journal of Physics, 2014
A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement ...
Christiana Panayi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy