Results 1 to 10 of about 1,706 (214)

Multi-Dimensional Routing, Wavelength, and Timeslot Allocation (RWTA) in Quantum Key Distribution Optical Networks (QKD-ON) [PDF]

open access: goldApplied Sciences, 2020
Currently, with the continuous advancement of network and communication technology, the amount of data carried by the optical network is very huge. The security of high-speed and large-capacity information in optical networks has attracted more and more ...
Xiaosong Yu   +6 more
doaj   +3 more sources

A Novel Error Correction Scheme In Quantum Key Distribution (Qkd) Protocol [PDF]

open access: bronzeMalaysian Journal of Computer Science, 2015
Ideally, in any quantum key distribution (QKD) communication system, each sifted key is expected to be received without error. However in practice, due to infeasibility of generating pure single photon and device impairment problem, some of the sifted key may experience errors.
Siao Ping Lee, Chee Kyun Ng, M. Mokhtar
  +6 more sources

Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy [PDF]

open access: goldIEEE Access, 2019
Quantum key distribution (QKD) promises to deliver secure keys, which can be applied for security demands in optical networks by using cost-efficient and scalable lightpaths. To achieve such secure communication, the QKD integrated with optical networks has become a promising scenario to provide key provisioning services in optical networks.
Hua Wang   +7 more
openaire   +3 more sources

Ring-Based Quantum Network with Quantum Key Distribution (QKD) and Quantum Digital Signature (QDS)

open access: diamondIOP Conference Series: Materials Science and Engineering, 2021
Abstract Quantum technological developments offers a great promise for implementing secure quantum internet. In this study, we propose a ring topology-based quantum network with QKD and QDS for the quantum internet. The combination of QKD and QDS allows both the detection of the intruder and the increase in security in the network.
Osman Ceylan, Ihsan Yilmaz
openaire   +2 more sources

Quantum Key Distribution (QKD) for Symmetric Key Transfer

open access: diamondInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
Classical cryptographic systems are increasingly challenged by advances in computing power and new algorithmic techniques, particularly with the rise of quantum computing, which threatens the security of current encryption methods. This has spurred interest in quantum-resistant cryptography, aimed at creating algorithms that can withstand attacks from ...
null Asoke Nath   +3 more
openaire   +3 more sources

Field test of quantum key distribution in the Tokyo QKD Network

open access: goldOptics Express, 2011
21 pages, 19 ...
Sasaki, M.   +45 more
openaire   +5 more sources

Enhancing Quantum Key Distribution (QKD) to address quantum hacking

open access: diamondProcedia Technology, 2012
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two remote parties, usually called Alice and Bob. Even though QKD has been proven to be unconditionally secure against the eavesdropper, commonly called Eve, practical implementations of QKD may contain vulnerabilities that may lead to the generated secret ...
Lizama, Luis   +3 more
openaire   +2 more sources

Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN) [PDF]

open access: goldApplied Sciences, 2019
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities.
Hua Wang, Yongli Zhao, Avishek Nag
doaj   +2 more sources

IC-QKD: An Information-Centric Quantum Key Distribution Network [PDF]

open access: greenIEEE Communications Magazine, 2023
Zhang, Qiaolun   +4 more
openaire   +3 more sources

The QKD (Quantum Key Distribution) Application in Cyber Security [PDF]

open access: bronzeRomanian Cyber Security Journal, 2023
Sorin SOVIANY   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy