Results 71 to 80 of about 1,030,100 (373)
Key Management Systems for Large-Scale Quantum Key Distribution Networks
The Key Management System (KMS) is an important component in scaling up from link-to-link key generation to large key distribution networks. In this work we provide an overview of a KMS in the context of Quantum Key Distribution Networks (QKDN) and give ...
Paul James +3 more
semanticscholar +1 more source
Reconciliation of a Quantum-Distributed Gaussian Key [PDF]
Two parties, Alice and Bob, wish to distill a binary secret key out of a list of correlated variables that they share after running a quantum key distribution protocol based on continuous-spectrum quantum carriers. We present a novel construction that allows the legitimate parties to get equal bit strings out of correlated variables by using a ...
Gilles Van Assche +2 more
openaire +3 more sources
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang +6 more
doaj +1 more source
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj +1 more source
Receiver-device-independent quantum key distribution protocols
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou +5 more
doaj +1 more source
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj +1 more source
Quantum key distribution via quantum encryption
A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key.
A. Cabello +24 more
core +1 more source
Device-independent quantum key distribution with asymmetric CHSH inequalities
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
E. Woodhead, A. Acín, Stefano Pironio
semanticscholar +1 more source
Quantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated.
Naya Nagy, Selim G. Akl
openaire +2 more sources
A Primer to Underwater Quantum Key Distribution
The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently,
Pietro Paglierani +5 more
openaire +1 more source

