To see the other types of publications on this topic, follow the link: QKDN.

Journal articles on the topic 'QKDN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'QKDN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jiang, Dong, Yuanyuan Chen, Xuemei Gu, Ling Xie, and Lijun Chen. "Efficient and universal quantum key distribution based on chaos and middleware." International Journal of Modern Physics B 31, no. 02 (January 18, 2017): 1650264. http://dx.doi.org/10.1142/s0217979216502647.

Full text
Abstract:
Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.
APA, Harvard, Vancouver, ISO, and other styles
2

Gyongyosi, Laszlo, Laszlo Bacsardi, and Sandor Imre. "A Survey on Quantum Key Distribution." Infocommunications journal, no. 2 (2019): 14–21. http://dx.doi.org/10.36244/icj.2019.2.2.

Full text
Abstract:
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. QKD schemes enable legal parties to establish unconditionally secret communication by exploiting the fundamental attributes of quantum mechanics. Here we present an overview of QKD rotocols. We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

POPPE, A., M. PEEV, and O. MAURHART. "OUTLINE OF THE SECOQC QUANTUM-KEY-DISTRIBUTION NETWORK IN VIENNA." International Journal of Quantum Information 06, no. 02 (April 2008): 209–18. http://dx.doi.org/10.1142/s0219749908003529.

Full text
Abstract:
A quantum key distribution (QKD) network is currently being implemented in Vienna by integrating seven QKD-link devices that connect five subsidiaries of Siemens Austria. We give an architectural overview of the network and present the enabling QKD technologies, as well as the novel QKD network protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security." Applied Sciences 11, no. 9 (April 22, 2021): 3767. http://dx.doi.org/10.3390/app11093767.

Full text
Abstract:
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communication distance, and routing protocol). Furthermore, we highlight the three challenges and future research issues in the security of QKD networks and then provide some feasible resolution strategies for these challenges.
APA, Harvard, Vancouver, ISO, and other styles
5

Pile, David F. P. "Twin-field QKD." Nature Photonics 12, no. 7 (June 28, 2018): 377. http://dx.doi.org/10.1038/s41566-018-0209-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Imran, Bettina Heim, Andreas Neuzner, and Christoph Marquardt. "Satellite-Based QKD." Optics and Photonics News 29, no. 2 (February 1, 2018): 26. http://dx.doi.org/10.1364/opn.29.2.000026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Djordjevic, Ivan B. "Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols." IEEE Photonics Journal 12, no. 1 (February 2020): 1–8. http://dx.doi.org/10.1109/jphot.2019.2946910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Huaxing, Shaohua Wang, Yang Huang, Yaqi Song, and Changlei Wang. "A Self-Stabilizing Phase Decoder for Quantum Key Distribution." Applied Sciences 10, no. 5 (March 1, 2020): 1661. http://dx.doi.org/10.3390/app10051661.

Full text
Abstract:
Self-stabilization quantum key distribution (QKD) systems are often based on the Faraday magneto-optic effect such as “plug and play” QKD systems and Faraday–Michelson QKD systems. In this article, we propose a new anti-quantum-channel disturbance decoder for QKD without magneto-optic devices, which can be a benefit for the photonic integration and applications in magnetic environments. The decoder is based on a quarter-wave plate reflector–Michelson (Q–M) interferometer, with which the QKD system can be free of polarization disturbance caused by quantum channel and optical devices in the system. The theoretical analysis indicates that the Q–M interferometer is immune to polarization-induced signal fading, where the operator of the Q–M interferometer corresponding to Pauli Matrix σ2 makes it satisfy the anti-disturbance condition naturally. A Q–M interferometer based time-bin phase encoding QKD setup is demonstrated, and the experimental results show that the QKD setup works stably with a low quantum bit error rate about 1.3% for 10 h over 60.6 km standard telecommunication optical fiber.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Hua, Yongli Zhao, and Avishek Nag. "Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)." Applied Sciences 9, no. 10 (May 21, 2019): 2081. http://dx.doi.org/10.3390/app9102081.

Full text
Abstract:
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall architecture, related interfaces, and protocols. Then, three-use cases are provided as important paradigms with their corresponding schemes and simulation performances.
APA, Harvard, Vancouver, ISO, and other styles
10

Trizna, Anastasija, and Andris Ozols. "An Overview of Quantum Key Distribution Protocols." Information Technology and Management Science 21 (December 14, 2018): 37–44. http://dx.doi.org/10.7250/itms-2018-0005.

Full text
Abstract:
Quantum key distribution (QKD) is the objects of close attention and rapid progress due to the fact that once first quantum computers are available – classical cryptography systems will become partially or completely insecure. The potential threat to today’s information security cannot be neglected, and efficient quantum computing algorithms already exist. Quantum cryptography brings a completely new level of security and is based on quantum physics principles, comparing with the classical systems that rely on hard mathematical problems. The aim of the article is to overview QKD and the most conspicuous and prominent QKD protocols, their workflow and security basement. The article covers 17 QKD protocols and each introduces novel ideas for further QKD system improvement.
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Yan Bo, Rong Wang, Yong Zhu, Min He, Xiao Wang, and Yu Guan. "The Quasi One-Time Pad Encryption Communication Based on Quantum Key Distribution." Advanced Materials Research 403-408 (November 2011): 2993–96. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2993.

Full text
Abstract:
For the lack in distance and speed of the current quantum key distribution (QKD) technology, Designed a point-to-point and network encryption communication scheme by quasi one-time pad based on QKD and segment QKD respectively, propose a method of making plaintext is invisible in relay nodes.
APA, Harvard, Vancouver, ISO, and other styles
12

Han, Wei, Xin Rong Wu, Yong Zhu, Wei Zhang, and Bin Zhou. "The Trust Relay QKD Network Communication Research." Advanced Materials Research 709 (June 2013): 421–26. http://dx.doi.org/10.4028/www.scientific.net/amr.709.421.

Full text
Abstract:
Because of its good network effect, expandability, technology easy to implement, the trust relay Quantum Key Distribution (QKD) network become future secure communication network preferred scheme. The classification and current status of the QKD network was introduced firstly; then the network model of trust relay network, network channel and key relay mode were put forward. Finally, the decisive parameters which affect the trust relay QKD networks effectiveness and performance were proposed. The simulation results confirm that the trust relay QKD network was used for secure communication is reliable.
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Shujing, Hui Liu, and Linguo Li. "Decoy state quantum-key-distribution by using odd coherent states without monitoring signal disturbance." International Journal of Quantum Information 17, no. 02 (March 2019): 1950012. http://dx.doi.org/10.1142/s0219749919500126.

Full text
Abstract:
Recently, a novel quantum-key-distribution (QKD) protocol, called Round-robin-differential-phase-shift (RRDPS) QKD, has been proposed to share a secure key without monitoring the signal disturbance. In this paper, we propose a decoy state RRDPS-QKD protocol with odd coherent states (OCS). We implement a one-intensity decoy state method into the RRDPS-QKD with OCS to estimate the key rate. The results show that both the maximum transmission distance and the key rate of our protocol are significantly improved. Moreover, only one-intensity decoy state is sufficient for the protocol to approach the asymptotic limit with infinite decoy states.
APA, Harvard, Vancouver, ISO, and other styles
14

LU, HUA, and QING-YU CAI. "QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE." International Journal of Quantum Information 06, no. 06 (December 2008): 1195–202. http://dx.doi.org/10.1142/s0219749908004353.

Full text
Abstract:
It seems that quantum key distribution (QKD) may be completely insecure when the message sender Alice always encodes her key bits in a fixed basis. In this paper, we present a QKD protocol with classical Alice, i.e. Alice always encodes her key bit in the {|0〉,|1〉} basis (we call it classical {0,1} basis) and the eavesdropper Eve knows this fact. We prove that our protocol is completely robust against any eavesdropping attack and present the amount of tolerable noise against Eve's individual attack. Next, we present a QKD protocol to demonstrate that secure key bits can be distributed even if neither Alice nor Bob has quantum capacities, and extend this idea to a QKD network protocol with numerous parties who have only classical capacities. Finally, we discuss that quantum is necessary in QKD for security reasons, but both Alice and Bob may be classical.
APA, Harvard, Vancouver, ISO, and other styles
15

Shukla, Chitra, Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Secure quantum communication with orthogonal states." International Journal of Quantum Information 14, no. 06 (September 2016): 1640021. http://dx.doi.org/10.1142/s0219749916400219.

Full text
Abstract:
In majority of protocols of secure quantum communication (such as, BB84, B92, etc.), the unconditional security of the protocols are obtained by using conjugate coding (two or more mutually unbiased bases (MUBs)). Initially, all the conjugate-coding-based protocols of secure quantum communication were restricted to quantum key distribution (QKD), but later on they were extended to other cryptographic tasks (such as, secure direct quantum communication and quantum key agreement). In contrast to the conjugate-coding-based protocols, a few completely orthogonal-state-based protocols of unconditionally secure QKD (such as, Goldenberg–Vaidman and N09) were also proposed. However, till the recent past, orthogonal-state-based protocols were only a theoretical concept and were limited to QKD. Only recently, orthogonal-state-based protocols of QKD are experimentally realized and extended to cryptographic tasks beyond QKD. This paper aims to briefly review the orthogonal-state-based protocols of secure quantum communication that are recently introduced by our group and other researchers.
APA, Harvard, Vancouver, ISO, and other styles
16

Engle, Ryan D., Douglas D. Hodson, Logan O. Mailloux, Michael R. Grimaila, Colin V. McLaughlin, and Gerald Baumgartner. "A module-based simulation framework to facilitate the modeling of Quantum Key Distribution system post-processing functionalities." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16, no. 1 (September 5, 2016): 45–56. http://dx.doi.org/10.1177/1548512916666740.

Full text
Abstract:
Quantum Key Distribution (QKD) systems are a novel technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys between two geographically separated parties. They are suitable for use in applications where high levels of secrecy are required, such as banking, government, and military environments. In this paper, we describe the development of a module-based QKD simulation framework that facilitates the modeling of QKD post-processing functionalities. We highlight design choices made to improve upon an initial design, which included the segmentation of functionalities associated with various phases of QKD post-processing into discrete modules implementing abstract interfaces. In addition, communication between modules was improved by implementing observers to share data, and a specific strategy for dealing with post-processing synchronization and configuration activities was designed. Collectively, these improvements resulted in a significantly enhanced analysis capability to model and study the security and performance characteristics associated with specific QKD system designs.
APA, Harvard, Vancouver, ISO, and other styles
17

Tang, Shi-Biao, and Jie Cheng. "Research on error-correction algorithm of high-speed QKD system based on FPGA." International Journal of Quantum Information 17, no. 02 (March 2019): 1950013. http://dx.doi.org/10.1142/s0219749919500138.

Full text
Abstract:
In the process of quantum key distribution (QKD), error correction algorithm is used to correct the error bits of the key at both ends. The existing applied QKD system has a low key rate and is generally Kbps of magnitude. Therefore, the performance requirement of data processing such as error correction is not high. In order to cope with the development demand of high-speed QKD system in the future, this paper introduces the Winnow algorithm to realize high-speed parity and hamming error correction based on Field Programmable Gate Array (FPGA), and explores the performance limit of this algorithm. FPGA hardware implementation can achieve the scale of Mbps bandwidth, with choosing different group length of sifted key by different error rate, and can achieve higher error correction efficiency by reducing the information leakage in the process of error correction, and improves the QKD system’s secure key rate, thus helping the future high-speed QKD system.
APA, Harvard, Vancouver, ISO, and other styles
18

Collins, Richard, and Djeylan Aktas. "QComms QKD Software Toolkit." Journal of Open Source Software 4, no. 38 (June 17, 2019): 1119. http://dx.doi.org/10.21105/joss.01119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Djordjevic, Ivan B. "QKD-Enhanced Cybersecurity Protocols." IEEE Photonics Journal 13, no. 2 (April 2021): 1–8. http://dx.doi.org/10.1109/jphot.2021.3069510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Elkouss, David, Jesus Martinez-Mateo, and Vicente Martin. "Information reconciliation for QKD." Quantum Information and Computation 11, no. 3&4 (March 2011): 226–38. http://dx.doi.org/10.26421/qic11.3-4-3.

Full text
Abstract:
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string ---the key--- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured signals ---the raw key--- must be stripped in order to distill a final, information theoretically secure, key. The key distillation process is a classical one in which basis reconciliation, error correction and privacy amplification protocols are applied to the raw key. This cleaning process is known as information reconciliation and must be done in a fast and efficient way to avoid cramping the performance of the QKD system. Brassard and Salvail proposed a very simple and elegant protocol to reconcile keys in the secret-key agreement context, known as \textit{Cascade}, that has become the de-facto standard for all QKD practical implementations. However, it is highly interactive, requiring many communications between the legitimate parties and its efficiency is not optimal, imposing an early limit to the maximum tolerable error rate. In this paper we describe a low-density parity-check reconciliation protocol that improves significantly on these problems. The protocol exhibits better efficiency and limits the number of uses of the communications channel. It is also able to adapt to different error rates while remaining efficient, thus reaching longer distances or higher secure key rate for a given QKD system.
APA, Harvard, Vancouver, ISO, and other styles
21

Ahsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (December 2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.

Full text
Abstract:
Quantum key distribution (QKD) is one of the exciting applications of quantum mechanics. It allows the sharing of secret keys between two communicating parties with unconditional security. A variety of QKD protocols have been proposed since the inception of the BB84 protocol. Among different implementation techniques of QKD protocols, there is a category which exploits higher dimensions qubit states to encode classical bits. In this paper, we focus on such a QKD protocol called KXB10, which uses three bases with higher dimensions. Analysis of the generalized dimension quantum states is performed by evaluating it based on the index transmission error rate ITER. We find that there is a direct relationship between qubit dimensions and ITER for the KXB10 protocol.
APA, Harvard, Vancouver, ISO, and other styles
22

Han, Jia-Jia, Shi-Hai Sun, and Lin-Mei Liang. "A Three-Node QKD Network Based on a Two-Way QKD System." Chinese Physics Letters 28, no. 4 (April 2011): 040303. http://dx.doi.org/10.1088/0256-307x/28/4/040303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhao, Bingzhen, Xiaoming Zha, Zhiyu Chen, Rui Shi, Dong Wang, Tianliang Peng, and Longchuan Yan. "Performance Analysis of Quantum Key Distribution Technology for Power Business." Applied Sciences 10, no. 8 (April 23, 2020): 2906. http://dx.doi.org/10.3390/app10082906.

Full text
Abstract:
Considering the complexity of power grid environments and the diversity of power communication transmission losses, this study proposes a quantum key distribution (QKD) network structure suitable for power business scenarios. Through simulating the power communication transmission environment, performance indicators of quantum channels and data interaction channels in power QKD systems are tested and evaluated from six aspects, such as distance loss, galloping loss, splice loss, data traffic, encryption algorithm and system stability. In the actual environment, this study combines the production business to build a QKD network suitable for power scenarios, and conducts performance analyses. The experimental results show that power QKD technologies can meet the operation index requirements of power businesses, as well as provide a reference for large-scale applications of the technology.
APA, Harvard, Vancouver, ISO, and other styles
24

Xue, Yang, Lei Shi, Jia-Hua Wei, Long-Qiang Yu, Hui-Cun Yu, and Jie Tang. "Reference-frame-independent quantum key distribution with random atmospheric transmission efficiency." Modern Physics Letters B 34, no. 36 (September 25, 2020): 2050416. http://dx.doi.org/10.1142/s0217984920504163.

Full text
Abstract:
Reference-frame-independent quantum key distribution (RFI-QKD) has been proved to be tolerant against unknown reference frame misalignment, which reserves interesting prospects in implementing global quantum communication. However, few works have been addressed on the performance and feasibility for RFI-QKD in turbulent atmospheric channels. Here, we propose to implement RFI-QKD in practical free-space links with fluctuating transmission efficiency due to beam wandering and broadening. An improved model for estimating the probability distribution of single-photon receiving efficiency has been developed and we also simulated the Gaussian beam spot evolution and secure key rate based on that. Results show that the beam wandering model of probability distribution of transmission efficiency is reasonable to improve the performance of RFI-QKD in free-space channel.
APA, Harvard, Vancouver, ISO, and other styles
25

Ali, Sellami. "DECOY STATE QUANTUM KEY DISTRIBUTION." IIUM Engineering Journal 10, no. 2 (March 2, 2010): 81–86. http://dx.doi.org/10.31436/iiumej.v10i2.8.

Full text
Abstract:
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Xiaoxu, Yang Wang, Musheng Jiang, Yifei Lu, Hongwei Li, Chun Zhou, and Wansu Bao. "Phase-Matching Quantum Key Distribution with Discrete Phase Randomization." Entropy 23, no. 5 (April 23, 2021): 508. http://dx.doi.org/10.3390/e23050508.

Full text
Abstract:
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound. One variation called phase-matching QKD (PM-QKD) protocol employs discrete phase randomization and the phase post-compensation technique to improve the key rate quadratically. However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. Then, we prove the rigorous security of decoy state PM-QKD with discrete phase randomization. Simulation results show that, considering the intrinsic bit error rate and sifting factor, there is an optimal discrete phase randomization value to guarantee security and performance. Furthermore, as the number of discrete phase randomization increases, the key rate of adopting vacuum and one decoy state approaches infinite decoy states, the key rate between discrete phase randomization and continuous phase randomization is almost the same.
APA, Harvard, Vancouver, ISO, and other styles
27

Bibak, Khodakhast, Robert Ritchie, and Behrouz Zolfaghari. "Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash." quantum Information and Computation 21, no. 3&4 (March 2021): 0181–202. http://dx.doi.org/10.26421/qic21.3-4-1.

Full text
Abstract:
Quantum key distribution (QKD) offers a very strong property called everlasting security, which says if authentication is unbroken during the execution of QKD, the generated key remains information-theoretically secure indefinitely. For this purpose, we propose the use of certain universal hashing based MACs for use in QKD, which are fast, very efficient with key material, and are shown to be highly secure. Universal hash functions are ubiquitous in computer science with many applications ranging from quantum key distribution and information security to data structures and parallel computing. In QKD, they are used at least for authentication, error correction, and privacy amplification. Using results from Cohen [Duke Math. J., 1954], we also construct some new families of $\varepsilon$-almost-$\Delta$-universal hash function families which have much better collision bounds than the well-known Polynomial Hash. Then we propose a general method for converting any such family to an $\varepsilon$-almost-strongly universal hash function family, which makes them useful in a wide range of applications, including authentication in QKD.
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Sunghoon, Jooyoun Park, and Jun Heo. "Improved reconciliation with polar codes in quantum key distribution." Quantum Information and Computation 18, no. 9&10 (August 2018): 795–813. http://dx.doi.org/10.26421/qic18.9-10-5.

Full text
Abstract:
Quantum key distribution (QKD) is a cryptographic system that generates an information-theoretically secure key shared by two legitimate parties. QKD consists of two parts: quantum and classical. The latter is referred to as classical post-processing (CPP). Information reconciliation is a part of CPP in which parties are given correlated variables and attempt to eliminate the discrepancies between them while disclosing a minimum amount of information. The elegant reconciliation protocol known as \emph{Cascade} was developed specifically for QKD in 1992 and has become the de-facto standard for all QKD implementations. However, the protocol is highly interactive. Thus, other protocols based on linear block codes such as Hamming codes, low-density parity-check (LDPC) codes, and polar codes have been researched. In particular, reconciliation using LDPC codes has been mainly studied because of its outstanding performance. Nevertheless, with small block size, the bit error rate performance of polar codes under successive-cancellation list (SCL) decoding with a cyclic redundancy check (CRC) is comparable to state-of-the-art turbo and LDPC codes. In this study, we demonstrate the use of polar codes to improve the performance of information reconciliation in a QKD system with small block size. The best decoder for polar codes, a CRC-aided SCL decoder, requires CRC-precoded messages. However, messages that are sifted keys in QKD are obtained arbitrarily as a result of a characteristic of the QKD protocol and cannot be CRC-precoded. We propose a method that allows arbitrarily obtained sifted keys to be CRC precoded by introducing a virtual string. Thus the best decoder can be used for reconciliation using polar codes and improves the efficiency of the protocol.
APA, Harvard, Vancouver, ISO, and other styles
29

Lin, Dakai, Duan Huang, Peng Huang, Jinye Peng, and Guihua Zeng. "High performance reconciliation for continuous-variable quantum key distribution with LDPC code." International Journal of Quantum Information 13, no. 02 (March 2015): 1550010. http://dx.doi.org/10.1142/s0219749915500100.

Full text
Abstract:
Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.
APA, Harvard, Vancouver, ISO, and other styles
30

SUN, MAOZHU, XIANG PENG, YUJIE SHEN, and HONG GUO. "SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL." International Journal of Quantum Information 10, no. 05 (August 2012): 1250059. http://dx.doi.org/10.1142/s0219749912500591.

Full text
Abstract:
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd and S. L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against the collective attack on the condition of the tomography of the quantum channels. We propose a family of new two-way CV-QKD protocols and prove their security against collective entangling cloner attacks without the tomography of the quantum channels. The simulation result indicates that the new protocols maintain the same advantage as the original two-way protocols whose tolerable excess noise surpasses that of the one-way CV-QKD protocol. We also show that all sub-protocols within the family have higher secret key rate and much longer transmission distance than the one-way CV-QKD protocol for the noisy channel.
APA, Harvard, Vancouver, ISO, and other styles
31

Bisztray, Tamas, and Laszlo Bacsardi. "The Evolution of Free-Space Quantum Key Distribution." Infocommunications journal, no. 1 (2018): 22–30. http://dx.doi.org/10.36244/icj.2018.1.4.

Full text
Abstract:
In this paper we are looking at the milestones that were achieved in free−space quantum key distribution as well as the current state of this technology. First a brief overview introduces the technical prerequisites that will help to better understand the rest of the paper. After looking into the first successful demonstrations of short range free space QKD both indoor and outdoor, we are examining the longer range terrestrial QKD experiments. In the next step we look at some experiments that were aiming to take free space QKD to the next level by placing the sender or the receiver on moving vehicles. After the terrestrial demonstrations we focus on satellite based experiments. Finally, we explore hyper-dimensional QKD, utilising energy−time, polarization and orbital angular momentum (OAM) degrees of freedom.
APA, Harvard, Vancouver, ISO, and other styles
32

Abirami, N., M. Sri Nivetha, and S. Veena. "End to End Encryption using QKD Algorithm." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (October 31, 2018): 936–39. http://dx.doi.org/10.31142/ijtsrd18723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sharma, Anand, and Saroj Lenka. "Transmission and control for QKD in online banking systems." Journal of Enterprise Information Management 30, no. 3 (April 10, 2017): 526–32. http://dx.doi.org/10.1108/jeim-08-2014-0084.

Full text
Abstract:
Purpose Quantum key distribution (QKD) is a technology, based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems, to generate and distribute provably secure cipher keys over unsecured channels. The authors are using this concept of QKD for the online banking systems. The paper aims to discuss these issues. Design/methodology/approach In order to function properly, any system using QKD needs to transport both quantum and classical data from a specified source to a specified destination, resolve competing requests for shared hardware, and manage shared keys between neighboring trusted nodes via a multi-hop mechanism. In this paper the authors are going to explain the transmission and control system for QKD implementation in online banking systems. Findings This paper presents the transmission and system control of QKD for online banking system is feasible under specific conditions outside a laboratory. Above, the authors have shown the research on the QKD based online banking systems. Though the current researches are focused on QKD systems for online banking systems, the techniques discussed can be applied to other quantum information processing involving photons. Combination with other efforts that are not mentioned here, such as entangled-photon-sources, single photon sources, two-qubit gates, and so on, will provide a rigid foundation for future quantum information technologies. Originality/value Recognizing the importance of online access as one of the vehicles for the development of cheaper, faster and more reliable services there are areas of improvement where all involved parties should endeavor to improve toward the deployment of services without unnecessary or excessive risks. This improvement applies to both retail and commercial customers and does not endorse any particular technology.
APA, Harvard, Vancouver, ISO, and other styles
34

Wengerowsky, Sören, Siddarth Koduru Joshi, Fabian Steinlechner, Julien R. Zichi, Sergiy M. Dobrovolskiy, René van der Molen, Johannes W. N. Los, et al. "Entanglement distribution over a 96-km-long submarine optical fiber." Proceedings of the National Academy of Sciences 116, no. 14 (March 14, 2019): 6684–88. http://dx.doi.org/10.1073/pnas.1818752116.

Full text
Abstract:
Quantum entanglement is one of the most extraordinary effects in quantum physics, with many applications in the emerging field of quantum information science. In particular, it provides the foundation for quantum key distribution (QKD), which promises a conceptual leap in information security. Entanglement-based QKD holds great promise for future applications owing to the possibility of device-independent security and the potential of establishing global-scale quantum repeater networks. While other approaches to QKD have already reached the level of maturity required for operation in absence of typical laboratory infrastructure, comparable field demonstrations of entanglement-based QKD have not been performed so far. Here, we report on the successful distribution of polarization-entangled photon pairs between Malta and Sicily over 96 km of submarine optical telecommunications fiber. We observe around 257 photon pairs per second, with a polarization visibility above 90%. Our results show that QKD based on polarization entanglement is now indeed viable in long-distance fiber links. This field demonstration marks the longest-distance distribution of entanglement in a deployed telecommunications network and demonstrates an international submarine quantum communication channel. This opens up myriad possibilities for future experiments and technological applications using existing infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
35

Engle, Ryan D., Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Colin V. McLaughlin, and Gerald Baumgartner. "Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16, no. 1 (March 23, 2017): 27–44. http://dx.doi.org/10.1177/1548512917698053.

Full text
Abstract:
Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.
APA, Harvard, Vancouver, ISO, and other styles
36

WEN, HAO, ZHENG-FU HAN, GUANG-CAN GUO, and PEI-LIN HONG. "QKD NETWORKS WITH PASSIVE OPTICAL ELEMENTS: ANALYSIS AND ASSESSMENT." International Journal of Quantum Information 07, no. 06 (September 2009): 1217–31. http://dx.doi.org/10.1142/s0219749909005730.

Full text
Abstract:
Quantum Key Distribution (QKD) networks are the trends toward multiple users' unconditional secure communication. Based on several passive optical devices, such as beam splitter, optical switch or wavelength divided multiplexer, various types of fiber-based QKD networks have been proposed. However, it is still hard to accurately assess these networks. To find the optimal solution, a general assessment that would not involve detailed schemes is quite necessary. In this paper, we introduce an evaluation method and analyze optical-device-based QKD networks including two rational aspects: (i) network connectivity and network bandwidth which reflect the network's flexibility and performance in theory; (ii) network cost that brings pragmatic restriction on the network construction in practice. Applying this model, we compare five typical types of optical-device-based QKD networks. The explicit results demonstrate the above networks' characteristics and some valuable conclusions.
APA, Harvard, Vancouver, ISO, and other styles
37

Pederzolli, Federico, Francescomaria Faticanti, and Domenico Siracusa. "Optimal Design of Practical Quantum Key Distribution Backbones for Securing CoreTransport Networks." Quantum Reports 2, no. 1 (January 30, 2020): 114–25. http://dx.doi.org/10.3390/quantum2010009.

Full text
Abstract:
We describe two mixed-integer linear programming formulations, one a faster version of a previous proposal, the other a slower but better performing new model, for the design of Quantum Key Distribution (QKD) sub-networks dimensioned to secure existing core fiber plants. We exploit existing technologies, including non-quantum repeater nodes and multiple disjoint QKD paths to overcome reach limitations while maintaining security guarantees. We examine the models’ performance using simulations on both synthetic and real topologies, quantifying their time and resulting QKD network cost compared to our previous proposal.
APA, Harvard, Vancouver, ISO, and other styles
38

Aubel, Judi, El Hadj Mamadou Alzouma, Ibrahim Djabel, Sani Ibrahim, and Boubacar Coulibaly. "From Qualitative Community Data Collection to Program Design: Health Education Planning in Niger." International Quarterly of Community Health Education 11, no. 4 (January 1991): 345–69. http://dx.doi.org/10.2190/v1dk-98xa-awu6-qkdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Qato, Dima. "The Politics of Deteriorating Health: The Case of Palestine." International Journal of Health Services 34, no. 2 (April 2004): 341–64. http://dx.doi.org/10.2190/7j8t-0up0-kw4m-qkbn.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Powell, Jack V., and Seungyoun Lee. "Perceptions of Preservice Teachers about Participation in Extracurricular Activities: Effects of Simulated and Real Experience." Journal of Educational Technology Systems 32, no. 2-3 (December 2003): 283–309. http://dx.doi.org/10.2190/836e-qkxn-qgme-uefa.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Poosanaas, P., K. Tonooka, I. R. Abothu, S. Komarneni, and K. Uchino. "Influence of Composition and Dopant on Photostriction in Lanthanum-Modified Lead Zirconate Titanate Ceramics." Journal of Intelligent Material Systems and Structures 10, no. 6 (June 1999): 439–45. http://dx.doi.org/10.1106/cnq4-wlff-palk-qkqn.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Pereira, Margarida, Go Kato, Akihiro Mizutani, Marcos Curty, and Kiyoshi Tamaki. "Quantum key distribution with correlated sources." Science Advances 6, no. 37 (September 2020): eaaz4487. http://dx.doi.org/10.1126/sciadv.aaz4487.

Full text
Abstract:
In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.
APA, Harvard, Vancouver, ISO, and other styles
43

Aravinda, S., Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories." International Journal of Quantum Information 12, no. 07n08 (November 2014): 1560020. http://dx.doi.org/10.1142/s0219749915600205.

Full text
Abstract:
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class A of crypto-protocols reduces to protocol class B in a scenario X, if for every instance a of A, there is an instance b of B and a secure transformation X that reproduces a given b, such that the security of b guarantees the security of a. Here we employ this reductive framework to study the relationship between security in quantum key distribution (QKD) and quantum secure direct communication (QSDC). We show that replacing the streaming of independent qubits in a QKD scheme by block encoding and transmission (permuting the order of particles block by block) of qubits, we can construct a QSDC scheme. This forms the basis for the block reduction from a QSDC class of protocols to a QKD class of protocols, whereby if the latter is secure, then so is the former. Conversely, given a secure QSDC protocol, we can of course construct a secure QKD scheme by transmitting a random key as the direct message. Then the QKD class of protocols is secure, assuming the security of the QSDC class which it is built from. We refer to this method of deduction of security for this class of QKD protocols, as key reduction. Finally, we propose an orthogonal-state-based deterministic key distribution (KD) protocol which is secure in some local post-quantum theories. Its security arises neither from geographic splitting of a code state nor from Heisenberg uncertainty, but from post-measurement disturbance.
APA, Harvard, Vancouver, ISO, and other styles
44

Jacak, Monika, Janusz Jacak, Piotr Jóźwiak, and Ireneusz Jóźwiak. "Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks." International Journal of Quantum Information 14, no. 02 (March 2016): 1630002. http://dx.doi.org/10.1142/s0219749916300023.

Full text
Abstract:
The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.
APA, Harvard, Vancouver, ISO, and other styles
45

Hodson, Douglas D., Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin, and Gerald Baumgartner. "Modeling quantum optics for quantum key distribution system simulation." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16, no. 1 (January 10, 2017): 15–26. http://dx.doi.org/10.1177/1548512916684561.

Full text
Abstract:
This article presents the background, development, and implementation of a simulation framework used to model the quantum exchange aspects of Quantum Key Distribution (QKD) systems. The presentation of our simulation framework is novel from several perspectives, one of which is the lack of published information in this area. QKD is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to understand the impact these non-idealities have on system performance and security. To study these non-idealities we present the development of a quantum communications modeling and simulation capability. This required a suitable mathematical representation of quantum optical pulses and optical component transforms. Furthermore, we discuss how these models are implemented within our Discrete Event Simulation-based framework and show how it is used to study a variety of QKD implementations.
APA, Harvard, Vancouver, ISO, and other styles
46

Lopes, Minal, and Nisha Sarwade. "Optimized decoy state QKD for underwater free space communication." International Journal of Quantum Information 16, no. 02 (March 2018): 1850019. http://dx.doi.org/10.1142/s0219749918500193.

Full text
Abstract:
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207[Formula: see text]kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Da-jun, Wen-zhe Zhong, Jin Zhong, Dong Jiang, and Hao Wu. "Optimization and Implementation of Efficient and Universal Quantum Key Distribution." Journal of Electrical and Computer Engineering 2020 (May 25, 2020): 1–9. http://dx.doi.org/10.1155/2020/3418780.

Full text
Abstract:
Since quantum key distribution (QKD) can provide proven unconditional security guaranteed by the fundamental laws of quantum mechanics, it has attracted increasing attention over the past three decades. Its low bit rate, however, cannot meet the requirements of modern applications. To solve this problem, recently, an efficient and universal QKD protocol based on chaotic cryptography and middleware technology was proposed, which efficiently increases the bit rate of the underlying QKD system. Nevertheless, we find that this protocol does not take the bit errors into account, and one error bit may lead to the failure of the protocol. In this paper, we give an optimized protocol and deploy it on a BB84 QKD platform. The experimental results show that the optimized version provides resistance to bit errors compared with the original version. And the statistical properties of the generated bits are fully assessed using different methods. The evaluation results prove that the proposed protocol can generate bits with outstanding properties.
APA, Harvard, Vancouver, ISO, and other styles
48

Yu, Xiaosong, Xian Ning, Qingcheng Zhu, Jiaqi Lv, Yongli Zhao, Huibin Zhang, and Jie Zhang. "Multi-Dimensional Routing, Wavelength, and Timeslot Allocation (RWTA) in Quantum Key Distribution Optical Networks (QKD-ON)." Applied Sciences 11, no. 1 (December 31, 2020): 348. http://dx.doi.org/10.3390/app11010348.

Full text
Abstract:
Currently, with the continuous advancement of network and communication technology, the amount of data carried by the optical network is very huge. The security of high-speed and large-capacity information in optical networks has attracted more and more attention. Quantum key distribution (QKD) provides information-theoretic security based on the laws of quantum mechanics. Introducing QKD into an optical network can greatly improve the security of the optical network. In order to reduce the cost of deployment on QKD infrastructure, quantum signals in QKD and classical signals in optical networks are multiplexed in the same fiber by wavelength-division manner. Moreover, due to the limited wavelength resources in an optical fiber, time-division technology is adopted to construct different kinds of channels in QKD system for efficient utilization of wavelength resources. Under such situation, how to satisfy the security requirements of service requests and complete the efficient scheduling of multi-dimensional resources, i.e., wavelengths and timeslots, is a challenging problem. This paper addresses this problem by considering multi-dimensional routing, wavelength, and timeslot allocation (RWTA) in short-distance quantum key distribution optical networks (QKD-ON), in which any two nodes can directly establish a quantum channel, and the maximum distance between any two nodes is less than the distance that can carry out point-to-point quantum key distribution process. While accommodating services with security requirements in QKD optical networks, to avoid the wavelength time-slot fragmentation caused by the constraints of wavelength consistency and time-slot continuity, we propose a time-window-based security orchestration strategy as well as relative-loss of time continuous compactness based RWTA strategy. We conducted the simulations under various scenarios, e.g., different key updating periods and different distributions on wavelength resources, etc., and the results show that the proposed strategy can achieve better performance compared with the baselines in terms of key success rate, key-updating delay, and blocking probability.
APA, Harvard, Vancouver, ISO, and other styles
49

Cao, Wen-Fei, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu, and Kai Chen. "Open-Destination Measurement-Device-Independent Quantum Key Distribution Network." Entropy 22, no. 10 (September 26, 2020): 1083. http://dx.doi.org/10.3390/e22101083.

Full text
Abstract:
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where two users establish secure communication and present realistic simulations by taking into account imperfections of both sources and detectors.
APA, Harvard, Vancouver, ISO, and other styles
50

Huang, Guoqi, Qin Dong, Wei Cui, and Rongzhen Jiao. "The Performance of Satellite-Based Links for Measurement-Device-Independent Quantum Key Distribution." Entropy 23, no. 8 (August 3, 2021): 1010. http://dx.doi.org/10.3390/e23081010.

Full text
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has high practical value. Satellite-based links are useful to build long-distance quantum communication network. The model of satellite-based links for MDI-QKD was proposed but it lacks practicality. This work further analyzes the performance of it. First, MDI-QKD and satellite-based links model are introduced. Then considering the operation of the satellite the performance of their combination is studied under different weather conditions. The results may provide important references for combination of optical-fiber-based links on the ground and satellite-based links in space, which is helpful for large-scale quantum communication network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography