Results 81 to 90 of about 10,496 (211)
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Quantum key distribution through quantum machine learning: a research review
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj +1 more source
Using Modeling and Simulation to Study Photon Number Splitting Attacks
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties.
Logan O. Mailloux +5 more
doaj +1 more source
Continuous-Variable Quantum Key Distribution Over Air Quantum Channel With Phase Shift
Continuous-variable quantum key distribution (CV-QKD) over air quantum channel enables to provide unconditional information security, which is the one of most promising techniques for information wireless transfer. Since the air channel is of fluctuation
Ming Li, Tianyi Wang
doaj +1 more source
High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics
Measurement-device-independent quantum key distribution (MDI QKD) removes all detector side channels and enables secure QKD with an untrusted relay.
Kejin Wei +14 more
doaj +1 more source
A Review of Software for Designing and Operating Quantum Networks
A quantum network can be organized following a three‐plane abstraction: infrastructure, logical, and control. A taxonomy of the network functions of the control plane is proposed, and the state of the art in software for quantum networks is discussed. A guide for future directions on software development is provided.
Robert J. Hayek +2 more
wiley +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source
Experimental demonstration of long-distance continuous-variable quantum key distribution
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni +4 more
core +3 more sources
The paper demonstrates a chip scale (4.5 x 4.5 mm2) silicon integrated system that is capable of distributing entangled photons over 160 km single mode fibers without dispersion compensations and external optical filters. The results highlight the potential for massive production and large‐scale deployed quantum integrated circuits for a future ...
Yue Qin, Hongnan Xu, Hon Ki Tsang
wiley +1 more source
Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S. +3 more
core +1 more source

