Results 21 to 30 of about 10,496 (211)

Prefixed-Threshold Real-Time Selection for Free-Space Sending-or-Not Twin-Field Quantum Key Distribution

open access: yesEntropy, 2022
As a variant of the twin-field quantum key distribution (TF-QKD), the sending-or-not twin-field quantum key distribution (SNS TF-QKD) is famous for its higher tolerance of misalignment error, in addition to the capacity of surpassing the rate–distance ...
Yang Yu   +4 more
doaj   +1 more source

Comparison of Discrete Variable and Continuous Variable Quantum Key Distribution Protocols with Phase Noise in the Thermal-Loss Channel [PDF]

open access: yesQuantum
Discrete-variable (DV) quantum key distribution (QKD) based on single-photon detectors and sources have been successfully deployed for long-range secure key distribution. On the other hand, continuous-variable (CV) quantum key distribution (QKD) based on
Sebastian P. Kish   +4 more
doaj   +1 more source

More optimal relativistic quantum key distribution

open access: yesScientific Reports, 2022
A great challenge in the field of quantum cryptography is the design and implementation of optimal quantum key distribution (QKD) scheme. An optimal scheme in terms of security is the so-called relativistic quantum key distribution; it ensures the ...
Georgi Bebrov
doaj   +1 more source

EVALUATION OF QUANTUM KEY DISTRIBUTION BY SIMULATION

open access: yesIraqi Journal of Information & Communication Technology, 2022
Quantum key distribution is a secure method for exchanging keys across communication entities. The first quantum key distribution (QKD) protocol, BB84, was introduced in 1984. The primary paradigm of QKD was initiated for a depolarizing channel.
Harith A. Qaisi, M. F. Al-Gailani
doaj   +1 more source

Demonstration of provably secure quantum key distribution (QKD)

open access: yesDisruptive Technologies in Information Sciences, 2018
Optimized Quantum Key Distribution (QKD) protocols revolutionize the cyber security by leveraging the quantum phenomenon for development of unbreakable security. Configurable quantum networks are necessary for accessible quantum applications amongst multiple users.
Billy E. Geerhart   +3 more
openaire   +2 more sources

Exploration Editors' Favorite Research in 2025. [PDF]

open access: yesExploration (Beijing)
Exploration, Volume 6, Issue 1, February 2026.
europepmc   +2 more sources

On High-Dimensional Twin-Field Quantum Key Distribution [PDF]

open access: yesQuantum
Twin-Field Quantum Key Distribution (QKD) is a QKD protocol that uses single-photon interference to perform QKD over long distances. QKD protocols that encode information using high-dimensional quantum states can benefit from increased key rates and ...
Ronny Mueller   +4 more
doaj   +1 more source

Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks

open access: yesEntropy, 2023
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks ...
Jie Jia   +4 more
doaj   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography

open access: yesnpj Quantum Information, 2021
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
doaj   +1 more source

A Novel Error Correction Scheme In Quantum Key Distribution (Qkd) Protocol [PDF]

open access: yesMalaysian Journal of Computer Science, 2015
Ideally, in any quantum key distribution (QKD) communication system, each sifted key is expected to be received without error. However in practice, due to infeasibility of generating pure single photon and device impairment problem, some of the sifted key may experience errors.
Siao Ping Lee, Chee Kyun Ng, M. Mokhtar
openaire   +2 more sources

Home - About - Disclaimer - Privacy