Results 171 to 180 of about 1,706 (214)
Some of the next articles are maybe not open access.
Practical Considerations on Quantum Key Distribution (QKD)
2013 International Conference on Advanced Computer Science Applications and Technologies, 2013The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others.
Wajdi Al-Khateeb +3 more
openaire +1 more source
Quantum Key Distribution (QKD) Protocols: A Survey
2018 4th International Conference on Wireless and Telematics (ICWT), 2018The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using ...
Ali Ibnun Nurhadi, Nana Rachmana Syambas
openaire +1 more source
Multicast network security using quantum key distribution (QKD)
2012 International Conference on Computer and Communication Engineering (ICCCE), 2012We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network generate secure keys to encrypt not only data but also ...
Sellami Ali +2 more
openaire +1 more source
Turbo codes for quantum key distribution (QKD) applications
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011This paper investigates further on Quantum Key Distribution (QKD) protocols based on classical error-correcting codes, previously proposed by the authors. In [1], the classic channel coding techniques were shown to be suitable, in particular conditions, instead of quantum error-correcting codes, for correcting errors that occur during the exchange of a
VATTA, Francesca +2 more
openaire +2 more sources
Quantum key distribution in partially-trusted QKD ring networks
2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), 2020The long-distance transmission of quantum secret key is a challenge for quantum communication. As far as the current relay technology is concerned, the trusted relay technology is a more practical scheme. However, the trusted relay technology requires every relay node to be trusted, but in practical applications, the security of some relay nodes cannot
Xinyi Lin +3 more
openaire +1 more source
A Survey of Quantum Key Distribution (QKD) Network Simulation Platforms
2021 2nd Global Conference for Advancement in Technology (GCAT), 2021The exponential development in Quantum Computing is becoming a threat to the existing asymmetric cryptographic algorithms like RSA (Rivest, Shamir, Adleman). A threat to these public key cryptographic algorithms is a threat to the entire Internet itself, as algorithms like RSA are the basic building blocks of existing secure Internet communication ...
Aravind Aji +2 more
openaire +1 more source
Fiber scattering limitations for Quantum Key Distribution (QKD) system
Conference on Lasers and Electro-Optics/International Quantum Electronics Conference and Photonic Applications Systems Technologies, 2004We characterized fiber scattering effects for quantum key distribution. Raman and Rayleigh scattering could be a limiting factor in system performance and should be considered in a QKD system ...
Darius Subacius +2 more
openaire +1 more source
Fragmentation-Based Quantum Key Distribution (QKD) in WDM Networks
2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), 2019To integrate QKD with WDM networks without affecting the provisioning of classical service requests, we propose a wavelength fragmentation assignment scheme for QKD devices, which uses Tabu search to get satisfied secure key rate.
Yongrui Zhang +3 more
openaire +1 more source
Field demonstration of quantum key distribution in the Tokyo QKD Network
2011 International Quantum Electronics Conference (IQEC) and Conference on Lasers and Electro-Optics (CLEO) Pacific Rim incorporating the Australasian Conference on Optics, Lasers and Spectroscopy and the Australian Conference on Optical Fibre Technology, 2011A secure communication network with novel quantum key distribution systems in a metropolitan area (very center of Tokyo) is reported. Different QKD schemes are integrated to demonstrate key relay for secure TV conferencing over a distance 45 km, stable long-term operation.
M. Fujiwara +17 more
openaire +1 more source
Quantum-Key Distribution (QKD) Fundamentals
2019This chapter is devoted to QKD fundamentals. The chapter starts with description of key differences between conventional cryptography, classical physical-layer security (PLS), and QKD. In section on QKD basics, after historical overview, we review different QKD types and describe briefly common postprocessing steps, namely, information reconciliation ...
openaire +1 more source

