Results 61 to 70 of about 10,496 (211)

Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

open access: yes, 2010
Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors.
  +17 more
core   +1 more source

Compact free‐electron lasers as enablers of beyond‐6G and quantum communication systems

open access: yesJournal of Synchrotron Radiation, Volume 33, Issue 3, Page 818-824, May 2026.
Compact free‐electron lasers are investigated as scalable, high‐coherence light sources capable of enabling beyond‐6G and quantum communication systems through ultrafast data rates, wide spectral tunability, and high signal‐to‐noise performance.Free‐electron lasers (FELs) are disruptive light sources that offer ultrashort pulses, wide spectral ...
Thair Abdulkareem Khalil Al-Aish   +1 more
wiley   +1 more source

Numerical finite-key analysis of quantum key distribution

open access: yesnpj Quantum Information, 2020
Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments,
Darius Bunandar   +3 more
doaj   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Adaptive Modulation for Continuous-Variable Quantum Key Distribution With Real Local Oscillators Under Phase Attack

open access: yesIEEE Photonics Journal, 2021
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences a phase attack security challenge due to the reference pulses transmitted along with quantum signals over an unsecure quantum channel.
Khaled Alaghbari   +4 more
doaj   +1 more source

Security of a new two-way continuous-variable quantum key distribution protocol

open access: yes, 2012
The original two-way continuous-variable quantum-key-distribution (CV QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd, and S. L. Braunstein, Nature Physics 4, 726 (2008)] give the security against the collective attack on the condition of the ...
Grosshans F.   +6 more
core   +1 more source

Ring-Based Quantum Network with Quantum Key Distribution (QKD) and Quantum Digital Signature (QDS)

open access: yesIOP Conference Series: Materials Science and Engineering, 2021
Abstract Quantum technological developments offers a great promise for implementing secure quantum internet. In this study, we propose a ring topology-based quantum network with QKD and QDS for the quantum internet. The combination of QKD and QDS allows both the detection of the intruder and the increase in security in the network.
Osman Ceylan, Ihsan Yilmaz
openaire   +1 more source

Entangled Photon Pair Generator Via Biexciton–Exciton Cascade in Semiconductor Quantum Dots and its Simulation

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 4, April 2026.
In this work an entangled photon pair generator that utilizes the biexciton–exciton cascade in semiconductor quantum dots is described on a physical, mathematical, and software level for interdisciplinary audiences, leading to Kraus operators to seamlessly incorporate it into bigger simulations.
Simon Sekavčnik   +2 more
wiley   +1 more source

A Novel Security Survival Model for Quantum Key Distribution Networks Enabled by Software-Defined Networking

open access: yesIEEE Access, 2023
Quantum key distribution (QKD) is a technique for distributing symmetric encryption keys securely using quantum physics. The rate of key distribution is low and decreases exponentially with increasing distance.
Omar Shirko, Shavan Askar
doaj   +1 more source

Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution

open access: yes, 2016
Compared with two-level quantum key distribution (QKD), highdimensional QKD enable two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical highdimensional decoy-state QKD ...
Bao, Haize   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy