Showing 161 - 180 results of 918 for search '"key distribution"', query time: 0.23s Refine Results
  1. 161
  2. 162

    An Improved Slice Reconciliation Protocol for Continuous-Variable Quantum Key Distribution by Xuan Wen, Qiong Li, Haokun Mao, Xiaojun Wen, Nan Chen

    Published 2021-10-01
    Subjects: “…continuous-variable quantum key distribution…”
    Get full text
    Article
  3. 163
  4. 164
  5. 165
  6. 166

    Security proof of practical quantum key distribution with detection-efficiency mismatch by Yanbao Zhang, Patrick J. Coles, Adam Winick, Jie Lin, Norbert Lütkenhaus

    Published 2021-01-01
    “…Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. …”
    Get full text
    Article
  7. 167
  8. 168

    Compounds of symmetric informationally complete measurements and their application in quantum key distribution by Armin Tavakoli, Ingemar Bengtsson, Nicolas Gisin, Joseph M. Renes

    Published 2020-10-01
    “…Going beyond fundamental considerations, we leverage these exotic properties to construct a protocol for quantum key distribution and analyze its security under general eavesdropping attacks. …”
    Get full text
    Article
  9. 169
  10. 170

    Robust Interior Point Method for Quantum Key Distribution Rate Computation by Hao Hu, Jiyoung Im, Jie Lin, Norbert Lütkenhaus, Henry Wolkowicz

    Published 2022-09-01
    “…Security proof methods for quantum key distribution, QKD, that are based on the numerical key rate calculation problem, are powerful in principle. …”
    Get full text
    Article
  11. 171

    Tight finite-key analysis for mode-pairing quantum key distribution by Ze-Hao Wang, Rong Wang, Zhen-Qiang Yin, Shuang Wang, Feng-Yu Lu, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Published 2023-09-01
    “…Abstract Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that is not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. …”
    Get full text
    Article
  12. 172

    Finite-key security analysis for quantum key distribution with leaky sources by Weilong Wang, Kiyoshi Tamaki, Marcos Curty

    Published 2018-01-01
    “…Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. …”
    Get full text
    Article
  13. 173
  14. 174

    Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels by Cerf, Nicolas J., Garcia-Patron Sanchez, Raul

    Published 2010
    “…A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other one-way Gaussian protocol. …”
    Get full text
    Article
  15. 175

    A New Relativistic Orthogonal States Quantum Key Distribution Protocol by Cotler, Jordan S., Shor, Peter W.

    Published 2015
    “…We introduce a new relativistic orthogonal states quantum key distribution protocol which leverages the properties of both quantum mechanics and special relativity to securely encode multiple bits onto the spatio-temporal modes of a single photon. …”
    Get full text
    Get full text
    Article
  16. 176

    Quantum information technology applications with squeezing: quantum key distribution and entanglement by Pradana, Andri

    Published 2022
    “…The results are then applied to the implementation of amplitude-squeezed coherent state in measurement-device-independent quantum key distribution. We find that with optimized squeezing parameter, the secret key rate is enhanced over the key rate using the coherent state. …”
    Get full text
    Thesis-Doctor of Philosophy
  17. 177

    A security enhanced authentication and key distribution protocol for wireless networks by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. …”
    Get full text
    Get full text
    Journal Article
  18. 178

    Implementation of two way Quantum Key Distribution protocol with decoy state by Abdul Khir , Mohd Fared, Mohd Zain, Mohd Norzaliman, Bahari, Iskandar, ., Suryadi, Shaari, Sahbudin

    Published 2012
    “…We report on the first demonstration of a two way Quantum Key Distribution (QKD) protocol with decoy state. The experiment was conducted over free space medium and exhibits a significant increase in the maximum secure distance of a two way QKD protocol specifically the LM05 protocol.…”
    Get full text
    Article
  19. 179

    Checking noise correlations for safer two-way quantum key distribution by Shamsul Shaari, Jesni, Lucamarini, Marco, Mancini, Stefano

    Published 2014
    “…We check for noise correlations between forward and backward paths in two-way quantum key distribution, which leads to reduced potentialities for an eavesdropper since she can only hide herself behind uncorrelated (natural) noise. …”
    Get full text
    Get full text
    Article
  20. 180