Results 61 to 70 of about 10,496 (211)
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors.
+17 more
core +1 more source
Compact free‐electron lasers as enablers of beyond‐6G and quantum communication systems
Compact free‐electron lasers are investigated as scalable, high‐coherence light sources capable of enabling beyond‐6G and quantum communication systems through ultrafast data rates, wide spectral tunability, and high signal‐to‐noise performance.Free‐electron lasers (FELs) are disruptive light sources that offer ultrashort pulses, wide spectral ...
Thair Abdulkareem Khalil Al-Aish +1 more
wiley +1 more source
Numerical finite-key analysis of quantum key distribution
Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments,
Darius Bunandar +3 more
doaj +1 more source
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo +5 more
wiley +1 more source
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences a phase attack security challenge due to the reference pulses transmitted along with quantum signals over an unsecure quantum channel.
Khaled Alaghbari +4 more
doaj +1 more source
Security of a new two-way continuous-variable quantum key distribution protocol
The original two-way continuous-variable quantum-key-distribution (CV QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd, and S. L. Braunstein, Nature Physics 4, 726 (2008)] give the security against the collective attack on the condition of the ...
Grosshans F. +6 more
core +1 more source
Ring-Based Quantum Network with Quantum Key Distribution (QKD) and Quantum Digital Signature (QDS)
Abstract Quantum technological developments offers a great promise for implementing secure quantum internet. In this study, we propose a ring topology-based quantum network with QKD and QDS for the quantum internet. The combination of QKD and QDS allows both the detection of the intruder and the increase in security in the network.
Osman Ceylan, Ihsan Yilmaz
openaire +1 more source
In this work an entangled photon pair generator that utilizes the biexciton–exciton cascade in semiconductor quantum dots is described on a physical, mathematical, and software level for interdisciplinary audiences, leading to Kraus operators to seamlessly incorporate it into bigger simulations.
Simon Sekavčnik +2 more
wiley +1 more source
Quantum key distribution (QKD) is a technique for distributing symmetric encryption keys securely using quantum physics. The rate of key distribution is low and decreases exponentially with increasing distance.
Omar Shirko, Shavan Askar
doaj +1 more source
Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
Compared with two-level quantum key distribution (QKD), highdimensional QKD enable two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical highdimensional decoy-state QKD ...
Bao, Haize +4 more
core +1 more source

