Results 81 to 90 of about 1,010,511 (221)

Design and analysis of communication protocols for quantum repeater networks

open access: yesNew Journal of Physics, 2016
We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a ...
Cody Jones   +4 more
doaj   +1 more source

Satellite-based measurement-device-independent quantum key distribution

open access: yesNew Journal of Physics, 2020
A satellite-based measurement-device-independent quantum key distribution model is proposed and its performance is analyzed through numerical simulations.
Wentao Liang, Rongzhen Jiao
doaj   +1 more source

Secure quantum key distribution with realistic devices

open access: yes, 2020
Some years ago quantum hacking became popular: devices implementing the unbreakable quantum cryptography were shown to have imperfections which could be exploited by attackers.
Feihu Xu   +4 more
semanticscholar   +1 more source

Passive Decoy-State Quantum Key Distribution with Coherent Light

open access: yesEntropy, 2015
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates,
Marcos Curty   +3 more
doaj   +1 more source

Completely Device Independent Quantum Key Distribution

open access: yes, 2016
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme.
Aguilar, E. A.   +3 more
core   +1 more source

Towards Communication-Efficient Quantum Oblivious Key Distribution [PDF]

open access: yes, 2012
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB_b in such a way that (1) Alice learns DB_b and ...
C. Crépeau   +8 more
core   +2 more sources

DECOY STATE QUANTUM KEY DISTRIBUTION

open access: yesInternational Islamic University Malaysia Engineering Journal, 2010
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to ...
Sellami Ali
doaj   +1 more source

Finite key effects in satellite quantum key distribution

open access: yesnpj Quantum Information, 2022
Global quantum communications will enable long-distance secure data transfer, networked distributed quantum information processing, and other entanglement-enabled technologies.
Jasminder S. Sidhu   +4 more
doaj   +1 more source

Key-Recycling Strategies in Quantum-Key-Distribution Networks

open access: yesApplied Sciences, 2020
Quantum-key-distribution (QKD) networks can provide absolutely secure keys for the entire communication system in theory. At present, the key-distribution rate is relatively low, and the key-distribution rate decreases exponentially as the distribution ...
Xinying Li   +4 more
doaj   +1 more source

Detector-Device-Independent Quantum Key Distribution

open access: yes, 2014
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy