搜索结果: 1-15 共查到“理学 quantum key”相关记录31条 . 查询时间(0.25 秒)
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Experimental measurement-device-independent quantum key distribution
measurement-device-independent quantum key distribution
2016/1/23
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and d...
Measurement-device-independent Quantum Key Distribution with Uncharacterized Qubit Sources
Measurement-device-independent Quantum Key Distribution Uncharacterized Qubit Sources
2016/1/23
Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that th...
Entanglement-based quantum key distribution with biased basis choice via free space
Entanglement-based quantum key distribution iased basis choice via free space
2016/1/23
We report a free-space entanglement-based quantum key dis-tribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entan...
Measurement-Device-Independent Quantum Key Distribution over 200 km
Measurement-Device-Independent Quantum Key Distribution
2016/1/22
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon de...
Min-entropy and quantum key distribution: non-zero key rates for "small" numbers of signals
min-entropy quantum key distribution non-zero key rates
2010/11/8
We calculate an achievable secret key rate for quantum key distribution with a finite number of signals, by evaluating the min-entropy explicitly. The min-entropy can be expressed in terms of the gues...
Continuous variable quantum key distribution in non-Markovian channels
non-Markovian variable quantum
2010/11/8
We address continuous variable quantum key distribution (QKD) in non-Markovian lossy channels and show how the non-Markovian features may be exploited to enhance security and/or to detect the presence...
Device-Independent Quantum Key Distribution with Commuting Measurements
Device-Independent Quantum Key Distribution ommuting Measurements
2010/10/19
We consider quantum key distribution in the device-independent scenario, i.e., where the
legitimate parties do not know (or trust) the exact specification of their apparatus. We show
how secure key ...
Security of quantum key distribution with state-dependent imperfections
quantum key distribution state-dependent imperfection security
2010/10/18
In practical quantum key distribution (QKD) system, the state prepara-tion and measurement are imperfect comparing with the ideal BB84 proto-col, which are always state-dependent in practical realizat...
nse-Coding Attack on Three-Party Quantum Key Distribution Protocols
nse-Coding Attack Three-Party Quantum Key Distribution Protocols
2010/10/19
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals
Passive sources Bennett-Brassard 1984 quantum key distribution protocol practical signals
2010/10/20
Most experimental realizations of quantum key distribution are based on the Bennett-Brassard
1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender
uses an ac...
Independent Attacks in Imperfect Settings; A Case for A Two Way Quantum Key Distribution Scheme
Independent Attacks Imperfect Settings A Case Quantum Key Distribution Scheme
2010/10/20
We review the study on a two way quantum key distribution protocol given imperfect settings
through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the suffi...
Secure device-independent quantum key distribution with causally independent measurement devices
Secure device-independent quantum key distribution causally independent measurement devices
2010/10/19
Device-independent quantum key distribution aims to provide key distribution schemes whose security is based on the laws of quantum physics but which does not require any assumptions
about the intern...
100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm
100 MHz Amplitude Polarization Modulated Optical Source Free-Space Quantum Key Distribution 850 nm
2010/10/19
We report on an integrated photonic transmitter of up to 100 MHz repetition rate, which emits pulses centered at 850 nm with arbitrary am-plitude and polarization. The source is suitable for free spac...