搜索结果: 1-15 共查到“quantum key distribution”相关记录50条 . 查询时间(0.187 秒)
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography conjugate coding quantum money
2016/1/26
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is
quantum key dist...
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Experimental measurement-device-independent quantum key distribution
measurement-device-independent quantum key distribution
2016/1/23
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and d...
Measurement-device-independent Quantum Key Distribution with Uncharacterized Qubit Sources
Measurement-device-independent Quantum Key Distribution Uncharacterized Qubit Sources
2016/1/23
Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that th...
Entanglement-based quantum key distribution with biased basis choice via free space
Entanglement-based quantum key distribution iased basis choice via free space
2016/1/23
We report a free-space entanglement-based quantum key dis-tribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entan...
Measurement-Device-Independent Quantum Key Distribution over 200 km
Measurement-Device-Independent Quantum Key Distribution
2016/1/22
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon de...
Field Test of Measurement-Device-Independent Quantum Key Distribution
Field test Measurement-Device-Independent Quantum Key Distribution Automatic Feedback Systems
2016/1/22
A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD)protocol is immune to all these...
Experimental Passive Decoystate Quantum Key Distribution
quantum key distribution passive decoy-state parametric down conversion
2016/1/22
The decoy-state method is widely used in practical quantum key distribution systems to replace ideal single photon sources with realistic light sources of varying intensities. Instead of active modula...
Memory-assisted Measurement-device Independent Quantum Key Distribution
Memory-assisted Measurement-device Independent Quantum Key Distribution
2016/1/22
A protocol with the potential of beating the existing distance records for con-ventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories i...
Engineering Fiber-Nonlinearity Based Entangled Photon Sources for Quantum Key Distribution Applications
Engineering Fiber-Nonlinearity Based Entangled Photon Sources Quantum Key Distribution Applications
2015/5/20
We model fiber parametric entangled photon sources for use in quantum key distribution applications. Effects of Raman scattered photons are evaluated and are found to be manageable when appropriately ...
Min-entropy and quantum key distribution: non-zero key rates for "small" numbers of signals
min-entropy quantum key distribution non-zero key rates
2010/11/8
We calculate an achievable secret key rate for quantum key distribution with a finite number of signals, by evaluating the min-entropy explicitly. The min-entropy can be expressed in terms of the gues...
Continuous variable quantum key distribution in non-Markovian channels
non-Markovian variable quantum
2010/11/8
We address continuous variable quantum key distribution (QKD) in non-Markovian lossy channels and show how the non-Markovian features may be exploited to enhance security and/or to detect the presence...
Device-Independent Quantum Key Distribution with Commuting Measurements
Device-Independent Quantum Key Distribution ommuting Measurements
2010/10/19
We consider quantum key distribution in the device-independent scenario, i.e., where the
legitimate parties do not know (or trust) the exact specification of their apparatus. We show
how secure key ...