Showing 281 - 300 results of 918 for search '"key distribution"', query time: 0.15s Refine Results
  1. 281
  2. 282

    Long-distance continuous-variable measurement-device-independent quantum key distribution with postselection by Kieran N. Wilkinson, Panagiotis Papanastasiou, Carlo Ottaviani, Tobias Gehring, Stefano Pirandola

    Published 2020-09-01
    “…We introduce a robust scheme for long-distance continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution in which we employ postselection between distant parties communicating through the medium of an untrusted relay. …”
    Get full text
    Article
  3. 283

    Application of quantum key distribution in intelligent security operation and maintenance of power communication networks by Hongnian Wen, Aixue Xu, Huijuan Qi

    Published 2023-11-01
    “…Therefore, this paper proposes a solution for intelligent security operation and maintenance of power communication network based on Quantum key distribution (QKD). QKD is an encryption technology based on the principle of quantum mechanics, which can realize secure Key exchange and resist attacks of traditional encryption algorithms. …”
    Get full text
    Article
  4. 284
  5. 285

    Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum Key Distribution Protocols by Florian Kanitschar, Ian George, Jie Lin, Twesh Upadhyaya, Norbert Lütkenhaus

    Published 2023-10-01
    “…Discrete-modulated (DM) continuous-variable quantum key distribution (CV-QKD) protocols are promising candidates for commercial implementations of quantum communication networks due to their experimental simplicity. …”
    Get full text
    Article
  6. 286
  7. 287

    Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation by Chun Zhou, Yu Zhou, Yangbin Xu, Yang Wang, Yifei Lu, Musheng Jiang, Xiaoxu Zhang, Wansu Bao

    Published 2022-05-01
    “…The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. …”
    Get full text
    Article
  8. 288
  9. 289
  10. 290
  11. 291
  12. 292

    Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution by Shimiao Li, Pengzhi Yin, Zehao Zhou, Jianheng Tang, Duan Huang, Ling Zhang

    Published 2023-03-01
    “…There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack strategies in CVQKD systems. …”
    Get full text
    Article
  13. 293

    Polarization based discrete variables quantum key distribution via conjugated homodyne detection by Mariana F. Ramos, Armando N. Pinto, Nuno A. Silva

    Published 2022-04-01
    “…Abstract Optical homodyne detection is widely adopted in continuous-variable quantum key distribution for high-rate field measurement quadratures. …”
    Get full text
    Article
  14. 294
  15. 295

    Protecting Fiber-Optic Quantum Key Distribution Sources against Light-Injection Attacks by Anastasiya Ponosova, Daria Ruzhitskaya, Poompong Chaiwongkhot, Vladimir Egorov, Vadim Makarov, Anqi Huang

    Published 2022-10-01
    “…A well-protected and characterized source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. …”
    Get full text
    Article
  16. 296
  17. 297
  18. 298
  19. 299

    RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91 by Y. Begimbayeva, T. Zhaxalykov

    Published 2022-06-01
    Subjects: “…quantum cryptography, quantum key distribution, heisenberg’s uncertainty principle, superposition, quantum gate, quantum entanglement.…”
    Get full text
    Article
  20. 300