Showing 401 - 420 results of 918 for search '"key distribution"', query time: 0.22s Refine Results
  1. 401
  2. 402
  3. 403

    Studying free-space transmission statistics and improving free-space quantum key distribution in the turbulent atmosphere by C Erven, B Heim, E Meyer-Scott, J P Bourgoin, R Laflamme, G Weihs, T Jennewein

    Published 2012-01-01
    “…To that end, we first study statistics generated by the turbulent atmosphere in an entanglement-based free-space quantum key distribution (QKD) system. Using the insights gained from this analysis, we study the effect of link fluctuations on the security and key generation rate of decoy state QKD concluding that it has minimal effect in the typical operating regimes. …”
    Get full text
    Article
  4. 404
  5. 405

    Scalable Network for Simultaneous Pairwise Quantum Key Distribution via Entanglement-Based Time-Bin Coding by Erik Fitzke, Lucas Bialowons, Till Dolejsky, Maximilian Tippmann, Oleg Nikiforov, Thomas Walther, Felix Wissel, Matthias Gunkel

    Published 2022-05-01
    “…We present a scalable star-shaped quantum-key-distribution (QKD) optical-fiber network. We use wavelength-division demultiplexing (WDM) of broadband photon pairs to establish key exchange between multiple pairs of participants simultaneously. …”
    Get full text
    Article
  6. 406
  7. 407
  8. 408

    Sending-or-not-sending twin-field quantum key distribution with discrete-phase-randomized weak coherent states by Cong Jiang, Zong-Wen Yu, Xiao-Long Hu, Xiang-Bin Wang

    Published 2020-12-01
    “…In many security proofs of quantum key distribution, the random phases of coherent states are assumed to be continuously modulated. …”
    Get full text
    Article
  9. 409
  10. 410

    Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks by Karol Łukanowski, Maria Balanzó-Juandó, Máté Farkas, Antonio Acín, Jan Kołodyński

    Published 2023-12-01
    “…This imposes a great challenge for determining attainable key rates in $\textit{device-independent quantum key distribution}$ (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. …”
    Get full text
    Article
  11. 411
  12. 412
  13. 413
  14. 414
  15. 415
  16. 416

    Floodlight quantum key distribution: A practical route to gigabit-per-second secret-key rates by Zhuang, Quntao, Zhang, Zheshen, Dove, Justin Michael, Wong, Franco N. C., Shapiro, Jeffrey H

    Published 2019
    “…The channel loss incurred in long-distance transmission places a significant burden on quantum key distribution (QKD) systems: they must defeat a passive eavesdropper who detects all the light lost in the quantum channel and does so without disturbing the light that reaches the intended destination. …”
    Get full text
    Article
  17. 417

    Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution by Shapiro, Jeffrey H.

    Published 2012
    “…The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. …”
    Get full text
    Get full text
    Article
  18. 418

    Quantum interference of multi-photon at beam splitter with application in measurement-device-independent quantum key distribution by Pradana, Andri, Chew, Lock Yue

    Published 2019
    “…We also look into the potential benefits of implementing the squeezed coherent state in discrete-variable Measurement-Device-Independent Quantum Key Distribution and find that by optimizing the squeezing parameter, the error rate can be significantly reduced. …”
    Get full text
    Get full text
    Journal Article
  19. 419

    Chip-based measurement-device-independent quantum key distribution using integrated silicon photonic systems by Cao, Lin, Luo, W., Wang, Yunxiang, Zou, J., Yan, R. D., Cai, H., Zhang, Yichen, Hu, X. L., Jiang, C., Fan, W. J., Zhou, X. Q., Dong, B., Luo, X. S., Lo, G. Q., Wang, Y. X., Xu, Z. W., Sun, S. H., Wang, X. B., Hao, Y. L., Jin, Y. F., Kwong, D. L., Kwek, Leongchuan, Liu, Aiqun

    Published 2020
    “…Measurement-device-independent (MDI) quantum key distribution (QKD) employs an untrusted relay to prevent the receiver from side-channel attacks commonly encountered in earlier QKD protocols. …”
    Get full text
    Journal Article
  20. 420

    Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP) by Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.

    Published 2010
    “…Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. …”
    Get full text
    Article