Results 11 to 20 of about 10,496 (211)

Field test of quantum key distribution in the Tokyo QKD Network

open access: yesOptics Express, 2011
21 pages, 19 ...
Sasaki, M.   +45 more
openaire   +6 more sources

Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)

open access: yesApplied Sciences, 2019
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities.
Hua Wang, Yongli Zhao, Avishek Nag
doaj   +3 more sources

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

Quantum Key Distribution [PDF]

open access: yes, 2011
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction
Chan, Philip   +3 more
core   +2 more sources

Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]

open access: yes, 2011
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs   +26 more
core   +2 more sources

Measurement-device-independent quantum communication with an untrusted source [PDF]

open access: yes, 2015
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core   +2 more sources

Enhancing Quantum Key Distribution (QKD) to address quantum hacking

open access: yesProcedia Technology, 2012
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two remote parties, usually called Alice and Bob. Even though QKD has been proven to be unconditionally secure against the eavesdropper, commonly called Eve, practical implementations of QKD may contain vulnerabilities that may lead to the generated secret ...
Lizama, Luis   +3 more
openaire   +1 more source

Practical challenges in quantum key distribution [PDF]

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy