Finite-key security analysis of differential-phase-shift quantum key distribution
Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the major QKD
protocols that can be implemented with a simple setup using a laser source and a passive …
protocols that can be implemented with a simple setup using a laser source and a passive …
[HTML][HTML] Quantum key distribution with flawed and leaky sources
In theory, quantum key distribution (QKD) allows secure communications between two
parties based on physical laws. However, most of the security proofs of QKD today make …
parties based on physical laws. However, most of the security proofs of QKD today make …
Measurement-device-independent quantum key distribution with leaky sources
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all
detection side-channels from quantum communication systems. The security proofs require …
detection side-channels from quantum communication systems. The security proofs require …
Finite-key security analysis for quantum key distribution with leaky sources
Security proofs of quantum key distribution (QKD) typically assume that the devices of the
legitimate users are perfectly shielded from the eavesdropper. This assumption is, however …
legitimate users are perfectly shielded from the eavesdropper. This assumption is, however …
Quantum key distribution with setting-choice-independently correlated light sources
Despite the enormous theoretical and experimental progress made so far in quantum key
distribution (QKD), the security of most existing practical QKD systems is not rigorously …
distribution (QKD), the security of most existing practical QKD systems is not rigorously …
Simultaneous Basis and Information Reconciliation in Quantum Key Distribution
We consider in this paper the practical implementation of a siftingless quantum key
distribution protocol. The protocol is considered siftingless since it combines sifting and error …
distribution protocol. The protocol is considered siftingless since it combines sifting and error …
Tight finite-key analysis for quantum key distribution without monitoring signal disturbance
Unlike traditional communication, quantum key distribution (QKD) can reach unconditional
security and thus attracts intensive studies. Among all existing QKD protocols, round-robin …
security and thus attracts intensive studies. Among all existing QKD protocols, round-robin …
Quality of Service Requirements
Modern telecommunications networks are based on packet-switching traffic processing and
the methodology by which packets can be delivered using an arbitrary route. However, for …
the methodology by which packets can be delivered using an arbitrary route. However, for …
[PDF][PDF] Communication distance and security improvement in satellite based quantum key distribution via photon polarization pseudo-random bases encoding
TA Giresse, YD Germain, A KOUMETIO, TM Armel - events.saip.org.za
New protocol to achieve very long-distance and secure communication between two
legitimate users (Alice and Bob) namely, the pseudo-random entangled photon based QKD …
legitimate users (Alice and Bob) namely, the pseudo-random entangled photon based QKD …
Implementation security of quantum key distribution
MA Freitas Pereira - 2021 - investigo.biblioteca.uvigo.es
The main goal of this research project is to analyse the security of practical implementations
of discrete-variable QKD systems. While it is true that in theory QKD can offer unconditional …
of discrete-variable QKD systems. While it is true that in theory QKD can offer unconditional …