-
21
Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints
Published 2022-10-01“…In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting, where the analysis can be reduced to qubit systems, by combining entropy bounds for variants of the well-known BB84 protocol with quantum constraints on qubit operators on the bipartite system shared by Alice and Bob. …”
Get full text
Article -
22
Improving Wireless Sensor Network Security Using Quantum Key Distribution
Published 2023-10-01Subjects: “…AES, BB84 protocol, QBER., QKD, WSN…”
Get full text
Article -
23
-
24
Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels
Published 2016-01-01“…The random irradiance fluctuation due to scintillation degrades the SKR performance of WCP-based QKD, and to improve the SKR performance, we propose an adaptive scheme in which transmit power is changed in accordance with the channel state information. We first optimize BB84 and decoy state-based QKD protocols for different channel transmittances. …”
Get full text
Article -
25
Red Teaming Generative AI/NLP, the BB84 quantum cryptography protocol and the NIST-approved Quantum-Resistant Cryptographic Algorithms
Published 2023“…</p> <br> <p>This research, conducted over five years, delves into the cybersecurity implications of this convergence, with a particular focus on AI/Natural Language Processing (NLP) models and quantum cryptographic protocols, notably the BB84 method and specific NIST-approved algorithms. …”
Internet publication -
26
Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution
Published 2022-06-01Subjects: “…bb84 protocol…”
Get full text
Article -
27
Security of Bennett–Brassard 1984 Quantum-Key Distribution under a Collective-Rotation Noise Channel
Published 2022-12-01Subjects: “…BB84 protocol…”
Get full text
Article -
28
Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
Published 2022-11-01“…In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. …”
Get full text
Article -
29
Silica Planar Lightwave Circuit Based Integrated 1 $\times$ 4 Polarization Beam Splitter Module for Free-Space BB84 Quantum Key Distribution
Published 2018-01-01“…When the module is loaded on the free-space BB84 QKD test-bed, quantum bit error rate and sifted key rate are 2.81% and 415 kb/s at clock rate of 100 MHz, respectively.…”
Get full text
Article -
30
Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station
Published 2023-11-01“…In order to better understand the role of randomness in QKD, I revisit the well-known “detector blinding” attack on the BB84 QKD protocol, which utilizes strong light to achieve undetectable and complete recovery of the secret key. …”
Get full text
Article -
31
Development Prospects and Enginering of Quantum Communication Systems in the Atmosphere
Published 2015-01-01Subjects: Get full text
Article -
32
Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
Published 2022-04-01Subjects: Get full text
Article -
33
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
Published 2020-12-01Subjects: Get full text
Article -
34
-
35
-
36
Rateless Protograph LDPC Codes for Quantum Key Distribution
Published 2024-01-01Subjects: “…BB84…”
Get full text
Article -
37
A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography
Published 2022-01-01Subjects: Get full text
Article -
38
Using Quantum Key Distribution With Free Space Optics to Secure Communications in High-Speed Trains
Published 2024-01-01Subjects: Get full text
Article -
39
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Published 2014-01-01Subjects: Get full text
Article -
40
LEO Satellites Constellation-to-Ground QKD Links: Greek Quantum Communication Infrastructure Paradigm
Published 2021-11-01Subjects: Get full text
Article