Showing 21 - 40 results of 1,613 for search '"BB84"', query time: 0.19s Refine Results
  1. 21

    Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints by Michele Masini, Stefano Pironio, Erik Woodhead

    Published 2022-10-01
    “…In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting, where the analysis can be reduced to qubit systems, by combining entropy bounds for variants of the well-known BB84 protocol with quantum constraints on qubit operators on the bipartite system shared by Alice and Bob. …”
    Get full text
    Article
  2. 22

    Improving Wireless Sensor Network Security Using Quantum Key Distribution by Laith H. Alhasnawy, Ameer K. AL-Mashanji

    Published 2023-10-01
    Subjects: “…AES, BB84 protocol, QBER., QKD, WSN…”
    Get full text
    Article
  3. 23
  4. 24

    Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels by Xiaole Sun, Ivan B. Djordjevic, Mark A. Neifeld

    Published 2016-01-01
    “…The random irradiance fluctuation due to scintillation degrades the SKR performance of WCP-based QKD, and to improve the SKR performance, we propose an adaptive scheme in which transmit power is changed in accordance with the channel state information. We first optimize BB84 and decoy state-based QKD protocols for different channel transmittances. …”
    Get full text
    Article
  5. 25

    Red Teaming Generative AI/NLP, the BB84 quantum cryptography protocol and the NIST-approved Quantum-Resistant Cryptographic Algorithms by Radanliev, P, De Roure, D, Santos, O

    Published 2023
    “…</p> <br> <p>This research, conducted over five years, delves into the cybersecurity implications of this convergence, with a particular focus on AI/Natural Language Processing (NLP) models and quantum cryptographic protocols, notably the BB84 method and specific NIST-approved algorithms. …”
    Internet publication
  6. 26
  7. 27
  8. 28

    Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment by Wenyuan Wang, Norbert Lütkenhaus

    Published 2022-11-01
    “…In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. …”
    Get full text
    Article
  9. 29

    Silica Planar Lightwave Circuit Based Integrated 1 $\times$ 4 Polarization Beam Splitter Module for Free-Space BB84 Quantum Key Distribution by Joong-Seon Choe, Heasin Ko, Byung-Seok Choi, Kap-Joong Kim, Chun Ju Youn

    Published 2018-01-01
    “…When the module is loaded on the free-space BB84 QKD test-bed, quantum bit error rate and sifted key rate are 2.81% and 415 kb/s at clock rate of 100 MHz, respectively.…”
    Get full text
    Article
  10. 30

    Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station by Mario Stipčević

    Published 2023-11-01
    “…In order to better understand the role of randomness in QKD, I revisit the well-known “detector blinding” attack on the BB84 QKD protocol, which utilizes strong light to achieve undetectable and complete recovery of the secret key. …”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35

    量子通信技术研究及其应用分析 by 卢利锋

    Published 2013-01-01
    Subjects: “…量子通信;单光子;BB84协议;纠缠态;量子密钥分配…”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40