Quantum Information Processing, Sensing, and Communications: Their Myths, Realities, and Futures
The recent advances in quantum information processing, sensing, and communications are
surveyed with the objective of identifying the associated knowledge gaps and formulating a …
surveyed with the objective of identifying the associated knowledge gaps and formulating a …
Collective attack free controlled quantum key agreement without quantum memory
Here we present a new protocol for controlled quantum key agreement and another protocol
for key agreement with a specific focus on the security analysis. Specifically, detailed …
for key agreement with a specific focus on the security analysis. Specifically, detailed …
Security of partially corrupted quantum repeater networks
Abstract Quantum Key Distribution allows two parties to establish a secret key that is secure
against computationally unbounded adversaries. To extend the distance between parties …
against computationally unbounded adversaries. To extend the distance between parties …
Efficient source-independent quantum conference key agreement
Quantum conference key agreement (QCKA) enables the unconditional secure distribution
of conference keys among multiple participants. Due to challenges in high-fidelity …
of conference keys among multiple participants. Due to challenges in high-fidelity …
Quantum key distribution with displaced thermal states
A Walton, A Ghesquière, BTH Varcoe - Entropy, 2024 - mdpi.com
Secret key exchange relies on the creation of correlated signals, serving as the raw resource
for secure communication. Thermal states exhibit Hanbury Brown and Twiss correlations …
for secure communication. Thermal states exhibit Hanbury Brown and Twiss correlations …
Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution
The wavelength attack utilizes the dependence of beam splitters (BSs) on wavelength to
cause legitimate users Alice and Bob to underestimate their excess noise so that Eve can …
cause legitimate users Alice and Bob to underestimate their excess noise so that Eve can …
Assessment of practical satellite quantum key distribution architectures for current and near-future missions
D Orsucci, P Kleinpaß, J Meister, I De Marco… - arxiv preprint arxiv …, 2024 - arxiv.org
Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the
computational hardness paradigm and is befitting for secure data transmission requiring …
computational hardness paradigm and is befitting for secure data transmission requiring …
Security of Partially Corrupted Repeater Chains
Quantum Key Distribution allows two parties to establish a secret key that is secure against
computationally unbounded adversaries. To extend the distance between parties, quantum …
computationally unbounded adversaries. To extend the distance between parties, quantum …