Academic literature on the topic 'Quantum key distribution (QKD)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quantum key distribution (QKD).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Quantum key distribution (QKD)"

1

Gyongyosi, Laszlo, Laszlo Bacsardi, and Sandor Imre. "A Survey on Quantum Key Distribution." Infocommunications journal, no. 2 (2019): 14–21. http://dx.doi.org/10.36244/icj.2019.2.2.

Full text
Abstract:
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. QKD schemes enable legal parties to establish unconditionally secret communication by exploiting the fundamental attributes of quantum mechanics. Here we present an overview of QKD rotocols. We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Jie, Bowen Dong, Le Kang, Huanwen Xie, and Banghong Guo. "Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks." Entropy 25, no. 4 (2023): 661. http://dx.doi.org/10.3390/e25040661.

Full text
Abstract:
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network. We developed a novel Hybrid-QKD-Network-Cost (HQNC) heuristic algorithm to solve the cost optimization problem. Simulations verified that the scheme in this paper could save the cost by over 50 percent and 90 percent, respectively.
APA, Harvard, Vancouver, ISO, and other styles
3

Asoke Nath, Shreya Maity, Soham Banerjee, and Rohit Roy. "Quantum Key Distribution (QKD) for Symmetric Key Transfer." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 270–80. http://dx.doi.org/10.32628/cseit24103105.

Full text
Abstract:
Classical cryptographic systems are increasingly challenged by advances in computing power and new algorithmic techniques, particularly with the rise of quantum computing, which threatens the security of current encryption methods. This has spurred interest in quantum-resistant cryptography, aimed at creating algorithms that can withstand attacks from quantum computers. Traditionally, secure key transport over alternate channels has been a significant challenge, but quantum mechanics offers a solution. Quantum Key Distribution (QKD) is a revolutionary method for secure communication that leverages quantum principles. Unlike traditional methods, QKD provides unconditional security, with key security ensured by the laws of physics rather than computational difficulty. The BB84 protocol, introduced in 1984 by Bennett and Brassard, is a leading QKD scheme known for its simplicity and effectiveness in generating eavesdropping-resistant cryptographic keys. It facilitates secure key transport over alternate channels. This documentation aims to advance QKD security by practically implementing and analyzing the BB84 protocol. Through detailed theoretical analysis, simulation studies, and experimental validation, the practical impacts, and limitations of BB84-based QKD systems are examined. Additionally, a practical implementation of quantum key distribution using a sudoku key demonstrates the process's simplicity and effectiveness. These findings are expected to pave new paths in the field of cryptanalysis in the emerging Quantum Age.
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Sellami. "DECOY STATE QUANTUM KEY DISTRIBUTION." IIUM Engineering Journal 10, no. 2 (2010): 81–86. http://dx.doi.org/10.31436/iiumej.v10i2.8.

Full text
Abstract:
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Qiang, Yinming Huang, Yongqiang Du, et al. "Advances in Chip-Based Quantum Key Distribution." Entropy 24, no. 10 (2022): 1334. http://dx.doi.org/10.3390/e24101334.

Full text
Abstract:
Quantum key distribution (QKD), guaranteed by the principles of quantum mechanics, is one of the most promising solutions for the future of secure communication. Integrated quantum photonics provides a stable, compact, and robust platform for the implementation of complex photonic circuits amenable to mass manufacture, and also allows for the generation, detection, and processing of quantum states of light at a growing system’s scale, functionality, and complexity. Integrated quantum photonics provides a compelling technology for the integration of QKD systems. In this review, we summarize the advances in integrated QKD systems, including integrated photon sources, detectors, and encoding and decoding components for QKD implements. Complete demonstrations of various QKD schemes based on integrated photonic chips are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Trizna, Anastasija, and Andris Ozols. "An Overview of Quantum Key Distribution Protocols." Information Technology and Management Science 21 (December 14, 2018): 37–44. http://dx.doi.org/10.7250/itms-2018-0005.

Full text
Abstract:
Quantum key distribution (QKD) is the objects of close attention and rapid progress due to the fact that once first quantum computers are available – classical cryptography systems will become partially or completely insecure. The potential threat to today’s information security cannot be neglected, and efficient quantum computing algorithms already exist. Quantum cryptography brings a completely new level of security and is based on quantum physics principles, comparing with the classical systems that rely on hard mathematical problems. The aim of the article is to overview QKD and the most conspicuous and prominent QKD protocols, their workflow and security basement. The article covers 17 QKD protocols and each introduces novel ideas for further QKD system improvement.
APA, Harvard, Vancouver, ISO, and other styles
7

LU, HUA, and QING-YU CAI. "QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE." International Journal of Quantum Information 06, no. 06 (2008): 1195–202. http://dx.doi.org/10.1142/s0219749908004353.

Full text
Abstract:
It seems that quantum key distribution (QKD) may be completely insecure when the message sender Alice always encodes her key bits in a fixed basis. In this paper, we present a QKD protocol with classical Alice, i.e. Alice always encodes her key bit in the {|0〉,|1〉} basis (we call it classical {0,1} basis) and the eavesdropper Eve knows this fact. We prove that our protocol is completely robust against any eavesdropping attack and present the amount of tolerable noise against Eve's individual attack. Next, we present a QKD protocol to demonstrate that secure key bits can be distributed even if neither Alice nor Bob has quantum capacities, and extend this idea to a QKD network protocol with numerous parties who have only classical capacities. Finally, we discuss that quantum is necessary in QKD for security reasons, but both Alice and Bob may be classical.
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Xiao Qiang, Cui Ling Luo, and Yan Yan. "Study on Quantum Key Distribution." Applied Mechanics and Materials 275-277 (January 2013): 2515–18. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2515.

Full text
Abstract:
Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. QKD is a research hotspot of international academia in recent years. We introduce some protocols: BB84 protocol, E91 protocol, SARG04 protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Jiameng, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, and Nan Chen. "An Efficient Routing Protocol for Quantum Key Distribution Networks." Entropy 24, no. 7 (2022): 911. http://dx.doi.org/10.3390/e24070911.

Full text
Abstract:
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do not account for the state of quantum secure keys on links, applying them in QKD networks directly will result in underutilization of quantum secure keys. Therefore, an efficient routing protocol for QKD networks, especially for large-scale QKD networks, is desperately needed. In this study, an efficient routing protocol based on optimized link-state routing, namely QOLSR, is proposed for QKD networks. QOLSR considerably improves quantum key utilization in QKD networks through link-state awareness and path optimization. Simulation results demonstrate the validity and efficiency of the proposed QOLSR routing protocol. Most importantly, with the growth of communication traffic, the benefit becomes even more apparent.
APA, Harvard, Vancouver, ISO, and other styles
10

Gui, Y., D. Unnikrishnan, M. Stanley, and I. Fatadin. "Metrology Challenges in Quantum Key Distribution." Journal of Physics: Conference Series 2416, no. 1 (2022): 012005. http://dx.doi.org/10.1088/1742-6596/2416/1/012005.

Full text
Abstract:
Abstract The metrology of the QKD devices and systems grows increasingly important in recent years not only because of the needs for conformance and performance testing in the standardization, but more importantly, imperfect implementation of the devices and systems or deviations from the theoretical models, which could be exploited by eavesdropper, should be carefully characterised to avoid the so-called side channel attack. In this paper, we review the recent advances in many aspects of the QKD metrology in both fibre based QKD and free space QKD systems, including a cutting edge metrology facility development and application, traceable calibration methods, and practical device characterising technologies, all of which have been contributed by the metrology communities and relative institutions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Quantum key distribution (QKD)"

1

Gariano, John, and Ivan B. Djordjevic. "PPLN-waveguide-based polarization entangled QKD simulator." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626494.

Full text
Abstract:
We have developed a comprehensive simulator to study the polarization entangled quantum key distribution (QKD) system, which takes various imperfections into account. We assume that a type-II SPDC source using a PPLN-based nonlinear optical waveguide is used to generate entangled photon pairs and implements the BB84 protocol, using two mutually unbiased basis with two orthogonal polarizations in each basis. The entangled photon pairs are then simulated to be transmitted to both parties; Alice and Bob, through the optical channel, imperfect optical elements and onto the imperfect detector. It is assumed that Eve has no control over the detectors, and can only gain information from the public channel and the intercept resend attack. The secure key rate (SKR) is calculated using an upper bound and by using actual code rates of LDPC codes implementable in FPGA hardware. After the verification of the simulation results, such as the pair generation rate and the number of error due to multiple pairs, for the ideal scenario, available in the literature, we then introduce various imperfections. Then, the results are compared to previously reported experimental results where a BBO nonlinear crystal is used, and the improvements in SKRs are determined for when a PPLN-waveguide is used instead.
APA, Harvard, Vancouver, ISO, and other styles
2

BARI, INAM. ""Soft Decoding Techniques for Quantum Key Distribution (QKD) and Weak Energy Optical Communication"." Doctoral thesis, Politecnico di Torino, 2014. http://hdl.handle.net/11583/2531893.

Full text
Abstract:
The focus of this research activity is to work on pragmatic information reconciliation applied to QKD schemes based on single photon or weak pulse laser (WPL) sources, so as to use feed-forward techniques which minimize the interaction between transmitter and receiver. The core ideas of the thesis are employing Forward Error Correction (FEC) coding as opposed to two-way communication for information reconciliation in QKD schemes, exploiting all the available information for data processing at the receiver including information available from the quantum channel, since optimized use of this information can lead to significant performance improvement, and providing a security versus secret-key rate trade-off to the end-user within the context of QKD systems. Moreover, as shown by accurate experimental studies, the communication channel used for quantum key exchange is not able to reach high levels of reliability (the Quantum Bit Error Rate -QBER may have a high value), both because of the inherent characteristics of the system, and of the presence of a possible attacker. In order to obtain acceptable residual error rates, it is necessary to use a parallel classical and public channel, characterized by high transmission rates and low error rates, on which to transmit only the redundancy bits of systematic channel codes with performance possibly close to the capacity limit. Furthermore, since the more redundancy is added by the channel code, the more the corresponding information can be used to decipher the private message itself, it becomes necessary to design high-rate codes obtained by puncturing a low-rate mother code, possibly achieving a redundancy such that elements of the secret message cannot be uniquely determined from the redundancy itself, so for that purpose we designed high rate LDPC codes. Using high rate codes increases the security with trade-off to performance. Other low photon number applications have also been considered, such as weak-laser pulses (WLP) communication. For that purpose, a low-complexity photon-counting receiver has been considered which may be employed in long-distance amplification-free classical optical communication schemes, and which is typically modeled as an equivalent Binary Symmetric Channel (BSC). We have developed a time varying Binary Input-Multiple Output (BIMO) channel model for this low-complexity photon-counting receiver, and analyzed its performance in presence of soft-metric based capacity approaching iteratively decoded error correcting codes, such as soft-metric based Low Density Parity Check (LDPC) codes and polar codes. We show that the classical channel capacity of the suggested BIMO model is higher than the capacity of the BSC model, and that the use of the BIMO model allows to feed the channel decoder with soft information, in the form of Log-Likelihood Ratios (LLRs), achieving a significant reduction in Bit Error Rate (BER) and Frame Error Rate (FER) with respect to classical hard-metric-based schemes which should be used in conjunction with a BSC channel model.
APA, Harvard, Vancouver, ISO, and other styles
3

Marulanda, Acosta Valentina. "Quantum Key Distribution through atmospheric turbulence : secure satellite-to-ground links." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS378.

Full text
Abstract:
Les exigences sans cesse croissantes des systèmes de télécommunication modernes en termes de débit, ainsi que la menace imminente que pose l’augmentation de la puissance de calcul des ordinateurs modernes sur les méthodes cryptographiques actuelles, font de la transmission sécurisée des données à la fois une exigence essentielle et un grand défi, et donc un domaine d'étude très actif. La distribution quantique des clés (QKD) permet l'échange de clés cryptographiques dont le niveau de sécurité ne dépend pas de la complexité d'un algorithme mathématique mais repose intrinsèquement sur l'exploitation des propriétés de la mécanique quantique. Cependant, le déploiement des systèmes QKD via des réseaux fibrés terrestres, est fortement limité en distance, et n'atteint que quelques centaines de kilomètres, en raison de l'atténuation exponentielle subie par les signaux transmis par fibre optique. Les méthodes d'amplification des répéteurs de communications optiques classiques ne sont pas compatibles avec un signal quantique, et en raison du manque de maturité technologique concernant les répéteurs quantiques, les relais satellite se présentent comme une alternative intéressante pour l'établissement de liaisons quantiques intercontinentales sécurisées. Nous présentons ici, dans le contexte d’un lien QKD descendant entre un satellite en orbite basse et le sol, un modèle complet du canal atmosphérique satellite-sol prenant conjointement en compte la turbulence, sa correction partielle par optique adaptative (OA) les pertes géométriques et les fluctuations de pointage à bord du satellite. Nous utilisons ce modèle pour évaluer les performances de trois protocoles QKD - à variables continues et à variables discrètes, avec des photons uniques ou intriqués - pour différentes conditions de turbulence, différents degrés de correction par OA, différents scénarios de configuration du lien (diamètre télescope, altitude du satellite…) et en prenant en compte les effets de taille finie. Les résultats obtenus montrent l’intérêt de l’utilisation d’un système d’OA : en effet , la performance en termes de taux de génération de clé de tous les protocoles analysés s’améliore en considérant une correction par OA. Cette augmentation du taux de clé est particulièrement significative pour les scénarios de forte turbulence, d’opération diurne et pour le protocole QKD à variables continues (CV). L’apport de l’OA est de plus démontré et quantifié dans une configuration très prometteuse exploitant l’émission de deux photons intriqués vers deux stations sol depuis un relais satellite qui n’est pas forcément de confiance. Afin de valider nos résultats de simulation, nous avons aussi commencé à implémenter un banc de test expérimental à partir d’une émulation simplifiée du canal atmosphérique et d’un système CV-QKD. Nous expliquons les difficultés rencontrées pendant cette mise en œuvre ainsi que les solutions proposées et des idées sur les perspectives de l’étude<br>The ever-growing demands of modern telecommunication systems in terms of data rates as well as the impending threat of the increasing computing power of modern computers, make the secure transmission of data an essential requirement and thus a very active field of study. Quantum key distribution (QKD) allows for the exchange of cryptographic keys whose security level does not depend on the complexity of a mathematical algorithm but rather relies on exploiting the properties of quantum mechanics cite{scarani2009}. Depending on the protocol, the key bits will be encoded either on the superposition of modes of individual photons, such as polarization modes, as is the case for the discrete variable protocols (DV) or they will be encoded into the quadratures of a very low flux electromagnetic field as it happens in the continuous variable protocols (CV). While offering security levels unattainable by classical means, QKD protocols in their terrestrial implementation are severely limited in distance reaching only several hundred kilometers because of the exponential attenuation suffered by fiber-transmitted signals. Since the amplification methods of classical optical communications repeaters are not compatible with a signal that is quantum in nature, and because of the current lack of technological maturity regarding quantum repeaters, satellite relays present an interesting alternative for the establishment of secure intercontinental quantum links. A study by Dequal et al. upon which a part of the present study is based on, examines the possibility of performing a continuous variable key exchange between a satellite and a ground station by proposing a modeling of the propagation channel accounting for the effects of beam wandering, a fluctuating atmospheric transmission and a fixed loss due to single mode fiber coupling. It is as an in-depth continuation of this analysis that this simulation study was initially developed. Taking into account in particular the effects of propagation through the turbulent atmosphere on the spatial coherence of the optical signal, as well as expanding on the protocols taken into account. Adaptive optics (AO) are able to partially correct some of the aforementioned propagation effects. A typical AO system consists of a feedback loop containing elements capable of measuring and correcting wavefront aberrations in real time and we will focus our efforts in analyzing the effect of such a system in the performance of several protocols of quantum key distribution under different scenarios
APA, Harvard, Vancouver, ISO, and other styles
4

Leifgen, Matthias. "Protocols and components for quantum key distribution." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät, 2016. http://dx.doi.org/10.18452/17473.

Full text
Abstract:
In dieser Doktorarbeit werden zwei Konzepte der Quanteninformationsverarbeitung realisiert. Der Quantenschlüsselaustausch ist revolutionär, weil er perfekte Sicherheit gewährleistet. Zahlreiche Quantenkryptografieprotokolle wurden schon untersucht. Zwei Probleme bestehen. Zum einen ist es sehr schwer, die Bedingungen herzustellen, die in den Annahmen für perfekte Sicherheit impliziert sind. Zum anderen sind die Reichweiten auf momentan etwa 200 km begrenzt, aufgrund des abnehmenden Signals gegenüber des konstanten Rauschens. Ein Experiment dieser Doktorarbeit beschäftigt sich mit dem ersten Problem. Insbesondere der übertragene Quantenzustands ist kritisch für die Sicherheit des Verfahrens. Es werden Einzelphotonen von Stickstoff- Fehlstellen-Zentren und zum ersten Mal von Silizium-Fehlstellen-Zentren für einen Quantenschlüsselaustausch mit Hilfe des BB84-Protokolls benutzt. Die Abweichung von idealen Einzelphotonenzuständen sowie deren Bedeutung für die Sicherheit werden analysiert. Die Übertragung von Quantenzuständen via Satellit könnte das Problem der begrenzten Reichweite lösen. Das neue Frequenz-Zeit- Protokoll eignet sich dafür besonders gut. Es wird während dieser Arbeit zum ersten Mal überhaupt implementiert. Umfangreiche Untersuchungen inklusive der Variation wesentlicher experimenteller Parameter geben Aufschluss über die Leistungsfähigkeit und Sicherheit des Protokolls. Außerdem werden elementare Bestandteile eines vollautomatischen Experiments zum Quantenschlüsselaustausch über Glasfasern in der sogenannten Time-bin-Implementierung mit autonomem Sender und Empfänger realisiert. Ein anderes Konzept der Quanteninformationsverarbeitung ist die Herstellung zufälliger Bitfolgen durch den Quantenzufall. Zufällige Bitfolgen haben zahlreiche Anwendungsgebiete in der Kryptografie und der Informatik. Die Realisierung eines Quantenzufallszahlengenerators mit mathematisch beschreibbarer und getesteter Zufälligkeit und hoher Bitrate wird ebenfalls beschrieben.<br>In this thesis, photonic quantum states are used for experimental realisations of two different concepts of quantum information processing. Quantum key distribution (QKD) is revolutionary because it is the only cryptographic scheme offering unconditional security. Two major problems prevail: Firstly, matching the conditions for unconditional security is challenging, secondly, long distance communication beyond 200 km is very demanding because an increasingly attenuated quantum state starts to fail the competition with constant noise. One experiment accomplished in this thesis is concerned with the first problem. The realisation of the actual quantum state is critical. Single photon states from nitrogen and for the first time also silicon vacancy defect centres are used for a QKD transmission under the BB84 (Bennett and Brassard 1984). The deviation of the used single photon states from the ideal state is thoroughly investigated and the information an eavesdropper obtains due to this deviation is analysed. Transmitting quantum states via satellites is a potential solution to the limited achievable distances in QKD. A novel protocol particularly suited for this is implemented for the first time in this thesis, the frequency-time (FT) protocol. The protocol is thoroughly investigated by varying the experimental parameters over a wide range and by evaluating the impact on the performance and the security. Finally, big steps towards a fully automated fibre-based BB84 QKD experiment in the time-bin implementation with autonomous sender and receiver units are accomplished. Another important concept using quantum mechanical properties as a resource is a quantum random number generator (QRNG). Random numbers are used for various applications in computing and cryptography. A QRNG supplying bits with high and quantifiable randomness at a record-breaking rate is reported and the statistical properties of the random output is thoroughly tested.
APA, Harvard, Vancouver, ISO, and other styles
5

Cusini, Gabriele. "Quantum Key Distribution with Continuous Variables for Satellite Systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
Recenti studi hanno dimostrato come i più avanzati algoritmi per la generazione e scambio di chiavi crittografiche risultino insicuri contro la futura enorme capacità computazionale dei computer quantistici. Come è possibile ottenere una chiave completamente sicura, assumendo che i computer quantistici possano rendere i protocolli attuali insicuri? Una possibile soluzione consiste nell'impiego di protocolli come il Quantum Key Distribution (QKD) il quale usa un sistema di comunicazione quantistica per lo scambio della chiave. Tale sistema garantisce la segretezza della chiave in virtù delle proprietà quantistiche di entanglement e quella di sovrapposizione di stati quantistici. Nelle comunicazioni quantistiche esistono due principali modi per mappare le informazioni, il primo consiste nel considerare stati quantici discreti 'Discrete Variable quantum state' (DV) mentre il secondo li considera continui 'Continuous Variable quantum state' (CV). E' su questa ultima rappresentazione che si basa il protocollo QKD analizzato e in fine simulato in questo elaborato. La trattazione del protocollo CV QKD verrà svolta considerando uno scenario di comunicazione terra-satellite in quanto esso rappresenta un importante passo verso un sistema quantistico globale, non limitato dai problemi di distanze propri delle fibre ottiche o dei canali terrestri.
APA, Harvard, Vancouver, ISO, and other styles
6

Woodhead, Erik. "Imperfections and self testing in prepare-and-measure quantum key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2014. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209185.

Full text
Abstract:
Quantum key distribution (QKD) protocols are intended to allow cryptographic keys to be generated and distributed in way that is provably secure based on inherent limitations, such as the no-cloning principle, imposed by quantum mechanics. This unique advantage compared with classical cryptography comes with an added difficulty: key bits in QKD protocols are encoded in analogue quantum states and their preparation is consequently subject to the usual imprecisions inevitable in any real world experiment. The negative impact of such imprecisions is illustrated for the BB84 QKD protocol. Following this, the main part of this thesis is concerned with the incorporation of such imprecisions in security proofs of the BB84 and two semi-device-independent protocols against the class of collective attacks. On a technical level, by contrast with the vast majority of security proofs developed since the turn of the century, in which recasting the protocol into an equivalent entanglement-based form features heavily in the analysis, the main results obtained here are approached directly from the prepare-and-measure perspective and in particular the connection with the no-cloning theorem and an early security proof by Fuchs et al. against the class of individual attacks is emphasised.<p><p>This thesis also summarises, as an appendix, a separate project which introduces and defines a hierarchy of polytopes intermediate between the local and no-signalling polytopes from the field of Bell nonlocality.<br>Doctorat en Sciences<br>info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
7

Qu, Zhen, and Ivan B. Djordjevic. "High-speed continuous-variable quantum key distribution over atmospheric turbulent channels." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626486.

Full text
Abstract:
We experimentally demonstrate a RF-assisted four-state continuous-variable quantum key distribution (CV-QKD) system in the presence of turbulence. The atmospheric turbulence channel is emulated by two spatial light modulators (SLMs) on which two randomly generated azimuthal phase patterns are recorded yielding Andrews' azimuthal phase spectrum. Frequency and phase locking are not required in our system thanks to the proposed digital phase noise cancellation (PNC) stage. Besides, the transmittance fluctuation can be monitored accurately by the DC level in this PNC stage, which is free of post-processing noise. The mean excess noise is measured to be 0.014, and the maximum secret key rate of >20Mbit/s can be obtained with the transmittance of 0.85, while employing the commercial PIN photodetectors.
APA, Harvard, Vancouver, ISO, and other styles
8

Širjov, Jakub. "Testovací polygon pro kvantovou distribuci klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442371.

Full text
Abstract:
The aim of this masters thesis is to explain quantum key distribution (QKD) and principle of signal transmission in the quantum channel. Further this thesis complains commercial distributors of QKD technologies and their individual appliances. Practical part of the thesis is separated to 3 parts. First part handles transmission of quantum keys in QKDNetsim simulator. Second part takes care of design and creation of a test polygon that allows for testing of many optical network configurations with quantum signal and normal data traffic being transmitted in a single fiber. Multiple simulations of use of various filter types to supress the signal noise in the program VPIphotonics and tested by QKDNetsim are shown in the last part of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
9

Gariano, John, and Ivan B. Djordjevic. "Multimode entanglement assisted QKD through a free-space maritime channel." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626495.

Full text
Abstract:
When using quantum key distribution (QKD), one of the trade-offs for security is that the generation rate of a secret key is typically very low. Recent works have shown that using a weak coherent source allows for higher secret key generation rates compared to an entangled photon source, when a channel with low loss is considered. In most cases, the system that is being studied is over a fiber-optic communication channel. Here a theoretical QKD system using the BB92 protocol and entangled photons over a free-space maritime channel with multiple spatial modes is presented. The entangled photons are generated from a spontaneous parametric down conversion (SPDC) source of type II. To employ multiple spatial modes, the transmit apparatus will contain multiple SPDC sources, all driven by the pump lasers assumed to have the same intensity. The receive apparatuses will contain avalanche photo diodes (APD), modeled based on the NuCrypt CPDS-1000 detector, and located at the focal point of the receive aperture lens. The transmitter is assumed to be located at Alice and Bob will be located 30 km away, implying no channel crosstalk will be introduced in the measurements at Alices side due to turbulence. To help mitigate the effects of atmospheric turbulence, adaptive optics will be considered at the transmitter and the receiver. An eavesdropper, Eve, is located 15 km from Alice and has no control over the devices at Alice or Bob. Eve is performing the intercept resend attack and listening to the communication over the public channel. Additionally, it is assumed that Eve can correct any aberrations caused by the atmospheric turbulence to determine which source the photon was transmitted from. One, four and nine spatial modes are considered with and without applying adaptive optics and compared to one another.
APA, Harvard, Vancouver, ISO, and other styles
10

Djordjevic, Ivan B. "Integrated Optics Modules Based Proposal for Quantum Information Processing, Teleportation, QKD, and Quantum Error Correction Employing Photon Angular Momentum." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/615122.

Full text
Abstract:
To address key challenges for both quantum communication and quantum computing applications in a simultaneous manner, we propose to employ the photon angular momentum approach by invoking the well-known fact that photons carry both the spin angular momentum (SAM) and the orbital angular momentum (OAM). SAM is associated with polarization, while OAM is associated with azimuthal phase dependence of the complex electric field. Given that OAM eigenstates are mutually orthogonal, in principle, an arbitrary number of bits per single photon can be transmitted. The ability to generate/analyze states with different photon angular momentum, by using either holographic or interferometric methods, allows the realization of quantum states in multidimensional Hilbert space. Because OAM states provide an infinite basis state, while SAM states are 2-D only, the OAM can also be used to increase the security for quantum key distribution (QKD) applications and improve computational power for quantum computing applications. The goal of this paper is to describe photon angular momentum based deterministic universal quantum qudit gates, namely, {generalized-X, generalized-Z, generalized-CNOT} qudit gates, and different quantum modules of importance for various applications, including (fault-tolerant) quantum computing, teleportation, QKD, and quantum error correction. For instance, the basic quantum modules for quantum teleportation applications include the generalized-Bell-state generation module and the QFT-module. The basic quantum module for quantum error correction and fault-tolerant computing is the nonbinary syndrome calculator module. The basic module for entanglement assisted QKD is either the generalized-Bell-state generation module or the Weyl-operator-module. The possibility of implementing all these modules in integrated optics is discussed as well. Finally, we provide security analysis of entanglement assisted multidimensional QKD protocols, employing the proposed qudit modules, by taking into account the imperfect generation of OAM modes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Quantum key distribution (QKD)"

1

Wolf, Ramona. Quantum Key Distribution. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mehic, Miralem, Stefan Rass, Peppino Fazio, and Miroslav Voznak. Quantum Key Distribution Networks. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06608-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, Nurul T. High-Rate, High-Dimensional Quantum Key Distribution Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quantum Key Distribution [Working Title]. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gnatyuk, Sergiy, ed. Advanced Technologies of Quantum Key Distribution. InTech, 2018. http://dx.doi.org/10.5772/65232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grasselli, Federico. Quantum Cryptography: From Key Distribution to Conference Key Agreement. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolf, Ramona. Quantum Key Distribution: An Introduction with Exercises. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Djordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Physical-Layer Security and Quantum Key Distribution. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Quantum key distribution (QKD)"

1

Wolf, Ramona. "Device-Independent QKD." In Quantum Key Distribution. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Ramona. "Recent Developments in Practical QKD." In Quantum Key Distribution. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djordjevic, Ivan B. "Quantum-Key Distribution (QKD) Fundamentals." In Physical-Layer Security and Quantum Key Distribution. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Djordjevic, Ivan B. "Discrete Variable (DV) QKD." In Physical-Layer Security and Quantum Key Distribution. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Djordjevic, Ivan B. "Continuous Variable (CV)-QKD." In Physical-Layer Security and Quantum Key Distribution. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Islam, Nurul T. "High-Dimensional Time-Phase QKD." In High-Rate, High-Dimensional Quantum Key Distribution Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, Nurul T. "Unstructured High-Dimensional Time-Phase QKD." In High-Rate, High-Dimensional Quantum Key Distribution Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Islam, Nurul T. "Scalable High-Dimensional Time-Bin QKD." In High-Rate, High-Dimensional Quantum Key Distribution Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Djordjevic, Ivan B. "Covert/Stealth/Low Probability of Detection Communications and QKD." In Physical-Layer Security and Quantum Key Distribution. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sriman, B., S. Arjunsiva, G. Aswath, S. Aishwariya, S. Aswin, and H. Dhatchana. "Quantum Cryptography – The Future of Secure Communication Using Quantum Key Distribution (QKD) Protocols." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68908-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Quantum key distribution (QKD)"

1

Conrad, Andrew, Samantha Isaac, Roderick Cochran, et al. "Vehicle-to-Vehicle Quantum Key Distribution (V2V-QKD)." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.aw4d.4.

Full text
Abstract:
Secure communication is required for future smart infrastructure networks. We demonstrate the first Quantum Key Distribution (QKD) link between two moving cars. Our system operates at low-speeds and at high-speeds on a U.S. Interstate Highway.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Heng, Ting Ye, Yan Pan, et al. "High-performance multi-carrier continuous-variable quantum key distribution." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.w1j.4.

Full text
Abstract:
We experimentally demonstrate a high-performance multi-carrier CV-QKD system with asymptotic SKRs of 1819.32Mbps@5km, 1078.48Mbps@10km, 374.19Mbps@25km, 112.96Mbps@50km, 34.63Mbps@75km and 12.58Mbps@100km, marking the first CV-QKD achieving Gbps SKR within 10km and ten Mbps SKR over 100km.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yichi, Haoqi Zhao, Tianwei Wu, Zihe Gao, Li Ge, and Liang Feng. "High-Dimensional Quantum Key Distribution by a Spin-Orbit Microlaser." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.ath5a.8.

Full text
Abstract:
High-dimensional quantum key distribution (HD-QKD) promises to enhance information capacity and noise-resilience. Here we report an integrated spin-orbit microlaser enabled HD-QKD through decoy-state BB84 protocol, demonstrating robust and compact real-time secret key generation strategy.
APA, Harvard, Vancouver, ISO, and other styles
4

Lim, Kyongchun, Byung-Seok Choi, Ju Hee Baek, et al. "Photonic Integrated Chip-based Reference Frame Independent Quantum Key Distribution Transmitter." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.th3i.4.

Full text
Abstract:
For the first time, we present a photonic integrated chip-based RFI QKD transmitter, modularized in CFP2 form factor. The transmitter’s capability is demonstrated through free-space QKD experiments, highlighting its potential for secure quantum communication.
APA, Harvard, Vancouver, ISO, and other styles
5

Zeng, Helen Zhi Jie, Ali Al-Juboori, Minh Anh Phan Nguyen, et al. "Integrated Room Temperature Single Photon Source in Hexagonal Boron Nitride for Quantum Key Distribution." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.aw4d.1.

Full text
Abstract:
Quantum Key Distribution (QKD) is important for a variety of quantum technologies. Here we demonstrate a free-space room temperature, discreet-variable QKD system using a bright Single photon sources (SPS) in hexagonal Boron Nitride (hBN).
APA, Harvard, Vancouver, ISO, and other styles
6

Piétri, Yoann, Matteo Schiavon, Valentina Marulanda Acosta, et al. "QOSST: A Highly Modular Open Source Platform for Continuous Variable Quantum Key Distribution Applications." In Quantum 2.0. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/quantum.2024.qth4b.4.

Full text
Abstract:
We present a highly modular Open Source Software to perform CV-QKD experiments. The software is hardware agnostic and was benchmarked on bulk and integrated receivers, reaching state of the art secret key rates.
APA, Harvard, Vancouver, ISO, and other styles
7

Akin, Utku, Jonas Berl, Tobias Fehenberger, and Norbert Hanik. "Digital Equalization Techniques for Continuous Variable Quantum Key Distribution." In Signal Processing in Photonic Communications. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/sppcom.2024.spw2h.2.

Full text
Abstract:
We experimentally investigate two digital equalization schemes for ISI mitigation in CV-QKD. The proposed static zero-forcing method shows similar performance to an adaptive equalizer at a significantly reduced DSP complexity.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, R., T. Roger, C. Perumangatt, M. Sanzaro, R. I. Woodward, and A. J. Shields. "QKD Secret Key Scaling with Ground Station Aperture Size and Satellite Overpass." In Quantum 2.0. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/quantum.2024.qth3a.38.

Full text
Abstract:
The secret key generation results for different telescope sizes and maximum satellite elevation within an overpass are generated using a satellite-to-ground quantum key distribution emulator which can support cost-effective satellite-QKD network deployment.
APA, Harvard, Vancouver, ISO, and other styles
9

Mihailescu, Marius Iulian, Valentina Marascu, and Bogdan M. Mihalcea. "Tests Towards Building a Quantum Key Distribution (QKD) Link." In 2024 International Conference on Applied Mathematics & Computer Science (ICAMCS). IEEE, 2024. https://doi.org/10.1109/icamcs62774.2024.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klicnik, Ondrej, Petr Munster, and Tomas Horvath. "Quantum Key Distribution (QKD) Multiplexing by Using the Attenuation Method." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.aw3d.4.

Full text
Abstract:
In this paper a novel approach to multiplexing quantum and classical channels into a single fiber is presented. A so-called attenuation method is used, that is mainly fo-cused on suppressing the influence of Raman noise.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Quantum key distribution (QKD)"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal entanglement distribution in overcoming photon loss, decoherence, and distance limitations in quantum networks. Additionally, it examines the hybrid integration of quantum-classical networking architectures, real-world experimental implementations such as satellite-based quantum communication and metropolitan-scale quantum cryptography, and the scalability challenges related to hardware, error correction, and network synchronization. The study also addresses post-quantum cryptography, quantum-resistant algorithms, and cybersecurity vulnerabilities in quantum communication, offering a comprehensive roadmap for the development of secure, scalable, and globally interconnected quantum networks. Keywords: Scalable quantum networks, quantum entanglement, entanglement distribution, quantum key distribution (QKD), secure communication, quantum repeaters, quantum memory, photon loss mitigation, quantum cryptography, post-quantum security, hybrid quantum-classical networks, metropolitan-scale quantum networks, satellite-based quantum communication, quantum internet, quantum coherence, quantum error correction, quantum teleportation, multi-nodal quantum entanglement, cybersecurity in quantum networks, quantum-resistant algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum error correction (QEC), deep learning-driven anomaly detection, and reinforcement learning for adaptive encryption, provide a self-learning security model for quantum communication systems. The study also examines quantum blockchain integration, AI-optimized quantum network traffic management, and secure quantum biometric authentication as emerging trends in AI-enhanced quantum cybersecurity. Additionally, it evaluates industry adoption, policy considerations, and global quantum security initiatives across China, the US, the EU, and India. By addressing scalability, automation, and real-time quantum security monitoring, this research provides a roadmap for leveraging AI in next-generation secure quantum networks to enable fault-tolerant, self-healing cybersecurity frameworks. Keywords: Quantum intelligence, machine learning, secure quantum networks, AI-driven quantum cryptography, quantum key distribution, post-quantum cryptography, neural network-based quantum error correction, deep learning anomaly detection, reinforcement learning in quantum security, AI-driven quantum authentication, quantum blockchain security, quantum biometric authentication, quantum-enhanced AI cybersecurity, real-time quantum security monitoring, AI-optimized quantum routing, scalable quantum encryption, quantum cybersecurity policy, AI-powered post-quantum security, self-healing quantum networks, AI-driven quantum forensics.
APA, Harvard, Vancouver, ISO, and other styles
3

Bush, Stephen. TIME-SENSITIVE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1870109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sobolewski, Roman. Quantum Key Distribution Using Polarized Single Photons. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada502752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

NORDHOLT, J., R. HUGHES, and ET AL. PRESENT AND FUTURE FREE-SPACE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), 2001. http://dx.doi.org/10.2172/790237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schwartz, Carey, and Shannon Viverette. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada607003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Habif, Jonathan. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada611885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwartz, Carey, and Shannon Viverette. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada604268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Habif, Jonathan. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada619758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Habif, Jonathan. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada619763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!