Results 21 to 30 of about 1,706 (214)

Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution

open access: yesElectrical, Control and Communication Engineering, 2022
The Quantum Key Distribution (QKD) is a well-researched secure communication method for exchanging cryptographic keys only known by the shared participants.
Grote Olaf, Ahrens Andreas
doaj   +1 more source

Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method

open access: yesEntropy, 2022
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters.
Ke Xue   +3 more
doaj   +1 more source

Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction

open access: yesEntropy, 2022
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang   +6 more
doaj   +1 more source

MODIFICATION & IMPLEMENTATION OF QUANTUM KEY DISTRIBUTION QKD(BB84) PROTOCOL

open access: hybridInternational Research Journal of Modernization in Engineering Technology and Science, 2023
Partho Chaky   +13 more
openaire   +2 more sources

1002 km twin-field quantum key distribution with finite-key analysis

open access: yesQuantum Frontiers, 2023
Quantum key distribution (QKD) holds the potential to establish secure keys over long distances. The distance of point-to-point QKD secure key distribution is primarily impeded by the transmission loss inherent to the channel.
Yang Liu   +18 more
doaj   +1 more source

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

Prefixed-Threshold Real-Time Selection for Free-Space Sending-or-Not Twin-Field Quantum Key Distribution

open access: yesEntropy, 2022
As a variant of the twin-field quantum key distribution (TF-QKD), the sending-or-not twin-field quantum key distribution (SNS TF-QKD) is famous for its higher tolerance of misalignment error, in addition to the capacity of surpassing the rate–distance ...
Yang Yu   +4 more
doaj   +1 more source

EVALUATION OF QUANTUM KEY DISTRIBUTION BY SIMULATION

open access: yesIraqi Journal of Information & Communication Technology, 2022
Quantum key distribution is a secure method for exchanging keys across communication entities. The first quantum key distribution (QKD) protocol, BB84, was introduced in 1984. The primary paradigm of QKD was initiated for a depolarizing channel.
Harith A. Qaisi, M. F. Al-Gailani
doaj   +1 more source

Comparison of Discrete Variable and Continuous Variable Quantum Key Distribution Protocols with Phase Noise in the Thermal-Loss Channel [PDF]

open access: yesQuantum
Discrete-variable (DV) quantum key distribution (QKD) based on single-photon detectors and sources have been successfully deployed for long-range secure key distribution. On the other hand, continuous-variable (CV) quantum key distribution (QKD) based on
Sebastian P. Kish   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy