Results 91 to 100 of about 8,299 (155)

Solid‐State Quantum Emitters

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
This perspective covers the development of solid‐state quantum emitters over the past three decades. It begins with a tutorial discussion of parameters used to assess their performance such as single‐photon purity, photon indistinguishability, source brightness, and on‐demand operation.
A. Mark Fox
wiley   +1 more source

Quantum Network Infrastructure

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
Quantum computing presents a threat to secure communication. Consequently, novel methods are investigated to address this global challenge, namely post quantum cryptography (PQC) and quantum key distribution (QKD). The image represents the distribution of a wavefunction over the entire world by using satellites in orbit.
Lisa Wörner   +7 more
wiley   +1 more source

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Long distance measurement-device-independent quantum key distribution with coherent-state superpositions

open access: yes, 2014
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS)
Cao, Wen-Fei   +6 more
core   +1 more source

A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels

open access: yesIEEE Access, 2017
Quantum key distribution (QKD) is an innovative solution in the cryptography world to prevent the information leakage that can sometimes be deliberate.
Abdulbast A. Abushgra   +1 more
doaj   +1 more source

Programmable Quantum Networked Microgrids

open access: yesIEEE Transactions on Quantum Engineering, 2020
Quantum key distribution (QKD) provides a potent solution to securely distribute keys for two parties. However, QKD itself is vulnerable to denial of service (DoS) attacks.
Zefan Tang   +3 more
doaj   +1 more source

Image Transmission Over Quantum Communication Systems With Three‐Qubit Error Correction

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
This research evaluates the performance of the three‐qubit error correction code, the fundamental and simplest technique in quantum channel coding, for image transmission over error‐prone channels. JPEG and HEIF format images are encoded using the three‐qubit error correction method and compared to the 1/3 rate polar codes.
Udara Jayasinghe   +4 more
wiley   +1 more source

Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs

open access: yesApplied Sciences
Ensuring secure data transmission in agrotechnical monitoring systems using unmanned aerial vehicles (UAVs) is critical due to increasing cyber threats, particularly with the advent of quantum computing. This study proposes the integration of Quantum Key
Makhabbat Bakyt   +4 more
doaj   +1 more source

Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication

open access: yesIEEE Internet of Things Journal
Increasing privacy and security concerns in intelligence-native 6G networks require quantum key distribution-secured semantic information communication (QKD-SIC). In QKD-SIC systems, edge devices connected via quantum channels can efficiently encrypt semantic information from the semantic source, and securely transmit the encrypted semantic information
Rakpong Kaewpuang   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy