Showing 361 - 380 results of 918 for search '"key distribution"', query time: 0.15s Refine Results
  1. 361

    Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol by Chun-Wei Yang

    Published 2022-11-01
    “…Then, using the encryption chain to propose a unitary-operation-based semi-quantum key distribution protocol (SQKD) protocol. In the existing SQKD protocols, semi-quantum environments adopt a round-trip transmission strategy. …”
    Get full text
    Article
  2. 362

    Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding by Tian Zhong, Hongchao Zhou, Robert D Horansky, Catherine Lee, Varun B Verma, Adriana E Lita, Alessandro Restelli, Joshua C Bienfang, Richard P Mirin, Thomas Gerrits, Sae Woo Nam, Francesco Marsili, Matthew D Shaw, Zheshen Zhang, Ligong Wang, Dirk Englund, Gregory W Wornell, Jeffrey H Shapiro, Franco N C Wong

    Published 2015-01-01
    “…Conventional quantum key distribution (QKD) typically uses binary encoding based on photon polarization or time-bin degrees of freedom and achieves a key capacity of at most one bit per photon. …”
    Get full text
    Article
  3. 363

    Evaluation of nitrogen- and silicon-vacancy defect centres as single photon sources in quantum key distribution by Matthias Leifgen, Tim Schröder, Friedemann Gädeke, Robert Riemann, Valentin Métillon, Elke Neu, Christian Hepp, Carsten Arend, Christoph Becher, Kristian Lauritsen, Oliver Benson

    Published 2014-01-01
    “…We demonstrate a quantum key distribution (QKD) testbed for room temperature single photon sources based on defect centres in diamond. …”
    Get full text
    Article
  4. 364
  5. 365

    Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution by Yaxi Pan, Ling Zhang, Duan Huang

    Published 2020-11-01
    “…As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice’s set-up. …”
    Get full text
    Article
  6. 366
  7. 367

    A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing by N Walenta, A Burg, D Caselunghe, J Constantin, N Gisin, O Guinnard, R Houlmann, P Junod, B Korzh, N Kulesza, M Legré, C W Lim, T Lunghi, L Monat, C Portmann, M Soucarros, R T Thew, P Trinkler, G Trolliet, F Vannel, H Zbinden

    Published 2014-01-01
    “…We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. …”
    Get full text
    Article
  8. 368

    Finite-key analysis of high-dimensional time–energy entanglement-based quantum key distribution by Lee, Catherine, Mower, Jacob, Zhang, Zheshen, Englund, Dirk R., Shapiro, Jeffrey H

    Published 2017
    “…We present a security analysis against collective attacks for a time–energy entanglement-based quantum key distribution protocol, given the practical constraints of single-photon detector efficiency, channel loss, and finite-key considerations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 369
  10. 370
  11. 371
  12. 372

    Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme by Shamsul Shaari, Jesni, Bahari, Iskandar

    Published 2010
    “…We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. …”
    Get full text
    Article
  13. 373

    Large-alphabet time-frequency entangled quantum key distribution by means of time-to-frequency conversion. by Nunn, J, Wright, L, Söller, C, Zhang, L, Walmsley, I, Smith, B

    Published 2013
    “…We introduce a novel time-frequency quantum key distribution (TFQKD) scheme based on photon pairs entangled in these two conjugate degrees of freedom. …”
    Journal article
  14. 374
  15. 375

    Polarization calibration scheme for a practical handheld free space quantum key distribution link by Zhou, L, Lowndes, D, Lee, V, Mitra, I, SaiGopal, T, Rarity, J, Faulkner, G, O'Brien, D

    Published 2020
    “…Free space Quantum Key Distribution (QKD) links between terminals that move relative to each other pose a number of challenges. …”
    Conference item
  16. 376

    Quantum key distribution for 5G networks: a review, state of art and future directions by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Harun, Nur Ziadah

    Published 2022
    “…These include improving the current technique in Quantum Cryptography through efficient key distribution and message sharing between users in 5G networks.…”
    Article
  17. 377

    An efficient reconciliation in removing errors using Bose, Chaudhuri, Hocquenghem code for quantum key distribution by Qamar, Riaz Ahmad, Maarof, Mohd. Aizaini, Ibrahim, Subariah

    Published 2012
    “…A quantum key distribution protocol(QKD), known as BB84, was developed in 1984 by Charles Bennett and Gilles Brassard. …”
    Article
  18. 378
  19. 379

    Adaptive Modulation for Continuous-Variable Quantum Key Distribution With Real Local Oscillators Under Phase Attack by Khaled Alaghbari, Konstantin Rumyantsev, Tawfig Eltaif, Osama Elmabrok, Heng-Siong Lim

    Published 2021-01-01
    “…Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences a phase attack security challenge due to the reference pulses transmitted along with quantum signals over an unsecure quantum channel. …”
    Get full text
    Article
  20. 380

    Measurement device-independent quantum key distribution with vector vortex modes under diverse weather conditions by Comfort Sekga, Mhlambululi Mafu

    Published 2023-09-01
    “…Abstract Most quantum key distribution schemes exploiting orbital angular momentum-carrying optical beams are based on conventional set-ups, opening up the possibility of detector side-channel attacks. …”
    Get full text
    Article