Results 81 to 90 of about 10,496 (211)

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Using Modeling and Simulation to Study Photon Number Splitting Attacks

open access: yesIEEE Access, 2016
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties.
Logan O. Mailloux   +5 more
doaj   +1 more source

Continuous-Variable Quantum Key Distribution Over Air Quantum Channel With Phase Shift

open access: yesIEEE Access, 2020
Continuous-variable quantum key distribution (CV-QKD) over air quantum channel enables to provide unconditional information security, which is the one of most promising techniques for information wireless transfer. Since the air channel is of fluctuation
Ming Li, Tianyi Wang
doaj   +1 more source

High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics

open access: yesPhysical Review X, 2020
Measurement-device-independent quantum key distribution (MDI QKD) removes all detector side channels and enables secure QKD with an untrusted relay.
Kejin Wei   +14 more
doaj   +1 more source

A Review of Software for Designing and Operating Quantum Networks

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 2, February 2026.
A quantum network can be organized following a three‐plane abstraction: infrastructure, logical, and control. A taxonomy of the network functions of the control plane is proposed, and the state of the art in software for quantum networks is discussed. A guide for future directions on software development is provided.
Robert J. Hayek   +2 more
wiley   +1 more source

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Experimental demonstration of long-distance continuous-variable quantum key distribution

open access: yes, 2012
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni   +4 more
core   +3 more sources

Monolithic Silicon Photonic Transceiver for 160 km Multi‐Channel Quantum Entanglement Distribution in Fiber Network

open access: yesLaser &Photonics Reviews, Volume 20, Issue 1, 8 January 2026.
The paper demonstrates a chip scale (4.5 x 4.5 mm2) silicon integrated system that is capable of distributing entangled photons over 160 km single mode fibers without dispersion compensations and external optical filters. The results highlight the potential for massive production and large‐scale deployed quantum integrated circuits for a future ...
Yue Qin, Hongnan Xu, Hon Ki Tsang
wiley   +1 more source

Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories

open access: yes, 2015
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy