Results 71 to 80 of about 1,030,100 (373)

Key Management Systems for Large-Scale Quantum Key Distribution Networks

open access: yesARES, 2023
The Key Management System (KMS) is an important component in scaling up from link-to-link key generation to large key distribution networks. In this work we provide an overview of a KMS in the context of Quantum Key Distribution Networks (QKDN) and give ...
Paul James   +3 more
semanticscholar   +1 more source

Reconciliation of a Quantum-Distributed Gaussian Key [PDF]

open access: yesIEEE Transactions on Information Theory, 2004
Two parties, Alice and Bob, wish to distill a binary secret key out of a list of correlated variables that they share after running a quantum key distribution protocol based on continuous-spectrum quantum carriers. We present a novel construction that allows the legitimate parties to get equal bit strings out of correlated variables by using a ...
Gilles Van Assche   +2 more
openaire   +3 more sources

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2015
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang   +6 more
doaj   +1 more source

Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits

open access: yesIEEE Access, 2017
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with
Muneer Alshowkan, Khaled M. Elleithy
doaj   +1 more source

Receiver-device-independent quantum key distribution protocols

open access: yesNew Journal of Physics, 2022
We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared
Marie Ioannou   +5 more
doaj   +1 more source

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

open access: yesEntropy, 2018
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An
Michel Boyer, Rotem Liss, Tal Mor
doaj   +1 more source

Quantum key distribution via quantum encryption

open access: yes, 2001
A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key.
A. Cabello   +24 more
core   +1 more source

Device-independent quantum key distribution with asymmetric CHSH inequalities

open access: yesQuantum, 2021
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
E. Woodhead, A. Acín, Stefano Pironio
semanticscholar   +1 more source

Quantum Authenticated Key Distribution

open access: yes, 2007
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated.
Naya Nagy, Selim G. Akl
openaire   +2 more sources

A Primer to Underwater Quantum Key Distribution

open access: yesQuantum Engineering, 2023
The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently,
Pietro Paglierani   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy