The goal of quantum key distribution (QKD) is to establish a secure key between two parties connected by an insecure quantum channel. To use a QKD protocol in practice, one has to prove that a finite size key is secure against general attacks: no matter the adversary’s attack, they canno...
The post-selection technique was proposed by Christandl, Knig, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 ...
Security of quantum key distribution with virtual mutually unbiased bases Authors : Hong-Wei Li1,*, Chen-Peng Hao1,*, Zhi-Jiang Chen1, Li Gong1, Yi-Fei Lu1, Yang Wang1, Jia-Ji Li1, Chun-Mei Zhang2, Rong Wang3, Zhen-Qiang Yin4,*, Qing-Yu Cai5,* DOI : https://doi.org/10....
Ma X F. Security of quantum key distribution with realistic devices. arxiv: quant-ph/0503057X. Ma. Security of quantum key distribution with realistic devices. arXiv: quant- ph/0503057, 2004.Ma X 2004 Security of quantum key distribution with realistic devices Master's Thesis University of...
Quantum key distribution (QKD) offers a reliable solution to communication problems that require long-term data security. For its widespread use, however, the rate and reach of QKD systems must be improved. Twin-field (TF) QKD is a step forward toward th
Quantum PhysicsIn this paper, we consider a quantum key distribution protocol (QKD) with two-way classical communication that is assisted by one-time pad encryption. We propose a two-way preprocessing that uses one-time pad encryption by previously shared secret key, and the net key rate of ...
quantum key distributionIn 2002, Li presented an asymmetrical quantum key distribution protocol which utilizes the correlations of Einstein-Podolsky-Rosen (EPR) pairs to establish a session key between two participants. Li claimed that an eavesdropper Eve cannot prevent his existence from being found ...
(2025). Quantum Computing in Cybersecurity Using Quantum Key Distribution and Quantum Random Number Generator. In: Hassanien, A.E., Rizk, R.Y., Darwish, A., Alshurideh, M.T.R., Snášel, V., Tolba, M.F. (eds) Proceedings of the 11th International Conference on Advanced Intelligent...
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacki...
In comparison to conventional discrete-variable (DV) quantum key distribution (QKD), continuous-variable (CV) QKD with homodyne/heterodyne measurements has distinct advantages of lower-cost implementation and affinity to wavelength division multiplexing. On the other hand, its continuous nature makes it...