Quantum Key Distribution (QKD) using LEO and MEO satellites and decoy states [PDF]
We have analyzed the feasibility of performing quantum key distribution (QKD), in earth-satellite and intersatellite links, with four quantum cryptography protocols: BB84 and SARG04 with and without decoy states. In order to facilitate the protocols comparison we have computed the rates using the optimal mean photon number for each protocol and for ...
Jose A. Lopez-Salcedo+3 more
openaire +2 more sources
In‐Network Quantum Computing for Future 6G Networks
Anticipated advancements in 6G technology are poised to offer widespread global coverage, leveraging a vast spectrum range encompassing sub‐6 GHz, mmWave, THz, and optical frequency bands. This expansion aims to significantly enhance data rates and connection density.
Helen Urgelles+5 more
wiley +1 more source
Quantum key distribution through quantum machine learning: a research review
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj +1 more source
Information reconciliation for QKD
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string ---the key--- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured ...
Elkouss Coronas, David+2 more
openaire +7 more sources
Two-Dimensional Quantum Key Distribution (QKD) Protocol for Increased Key Rate Fiber-Based Quantum Communications [PDF]
We experimentally prove a novel two-dimensional QKD scheme, relying on differential phasetime shifting (DPTS) of strongly attenuated weak coherent pulses. We demonstrate QKD transmission up to 170 km standard fiber, and even include a classical channel up to 90 km.
Kjeld Dalgaard+6 more
openaire +2 more sources
Chirped Pulses Meet Quantum Dots: Innovations, Challenges, and Future Perspectives
Chirped laser pulse excitation is the most robust method to generate high‐quality photon states from quantum dots. Here, a comprehensive overview of methods is presented to produce and characterize chirped pulses, by providing numerical design examples with experimental advantages and challenges in each.
Florian Kappe+12 more
wiley +1 more source
Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
Compared with two-level quantum key distribution (QKD), highdimensional QKD enable two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical highdimensional decoy-state QKD ...
Bao, Haize+4 more
core +1 more source
Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD)
Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed
Yuan, C. A.O.+4 more
openaire +4 more sources
Implementation Security in Quantum Key Distribution
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero+2 more
wiley +1 more source
Optimal eavesdropping on quantum key distribution without quantum memory [PDF]
We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting ...
Bocquet, Aurélien+2 more
openaire +6 more sources