Results 81 to 90 of about 8,299 (155)

Quantum Key Distribution (QKD) using LEO and MEO satellites and decoy states [PDF]

open access: yes2008 10th International Workshop on Signal Processing for Space Communications, 2008
We have analyzed the feasibility of performing quantum key distribution (QKD), in earth-satellite and intersatellite links, with four quantum cryptography protocols: BB84 and SARG04 with and without decoy states. In order to facilitate the protocols comparison we have computed the rates using the optimal mean photon number for each protocol and for ...
Jose A. Lopez-Salcedo   +3 more
openaire   +2 more sources

In‐Network Quantum Computing for Future 6G Networks

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
Anticipated advancements in 6G technology are poised to offer widespread global coverage, leveraging a vast spectrum range encompassing sub‐6 GHz, mmWave, THz, and optical frequency bands. This expansion aims to significantly enhance data rates and connection density.
Helen Urgelles   +5 more
wiley   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Information reconciliation for QKD

open access: yesQuantum Information and Computation, 2011
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string ---the key--- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured ...
Elkouss Coronas, David   +2 more
openaire   +7 more sources

Two-Dimensional Quantum Key Distribution (QKD) Protocol for Increased Key Rate Fiber-Based Quantum Communications [PDF]

open access: yes2017 European Conference on Optical Communication (ECOC), 2017
We experimentally prove a novel two-dimensional QKD scheme, relying on differential phasetime shifting (DPTS) of strongly attenuated weak coherent pulses. We demonstrate QKD transmission up to 170 km standard fiber, and even include a classical channel up to 90 km.
Kjeld Dalgaard   +6 more
openaire   +2 more sources

Chirped Pulses Meet Quantum Dots: Innovations, Challenges, and Future Perspectives

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
Chirped laser pulse excitation is the most robust method to generate high‐quality photon states from quantum dots. Here, a comprehensive overview of methods is presented to produce and characterize chirped pulses, by providing numerical design examples with experimental advantages and challenges in each.
Florian Kappe   +12 more
wiley   +1 more source

Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution

open access: yes, 2016
Compared with two-level quantum key distribution (QKD), highdimensional QKD enable two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical highdimensional decoy-state QKD ...
Bao, Haize   +4 more
core   +1 more source

Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD)

open access: yesOptics Express, 2017
Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed
Yuan, C. A.O.   +4 more
openaire   +4 more sources

Implementation Security in Quantum Key Distribution

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero   +2 more
wiley   +1 more source

Optimal eavesdropping on quantum key distribution without quantum memory [PDF]

open access: yesJournal of Physics A: Mathematical and Theoretical, 2011
We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting ...
Bocquet, Aurélien   +2 more
openaire   +6 more sources

Home - About - Disclaimer - Privacy