To see the other types of publications on this topic, follow the link: Quantum key distribution (QKD) networks.

Journal articles on the topic 'Quantum key distribution (QKD) networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Quantum key distribution (QKD) networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yao, Jiameng, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, and Nan Chen. "An Efficient Routing Protocol for Quantum Key Distribution Networks." Entropy 24, no. 7 (2022): 911. http://dx.doi.org/10.3390/e24070911.

Full text
Abstract:
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do n
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Jie, Bowen Dong, Le Kang, Huanwen Xie, and Banghong Guo. "Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks." Entropy 25, no. 4 (2023): 661. http://dx.doi.org/10.3390/e25040661.

Full text
Abstract:
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network. We developed a novel Hybrid-QKD-Network-Cost (HQNC) heuristic algorithm to solve the cost optimization problem. S
APA, Harvard, Vancouver, ISO, and other styles
3

Sim, Dong-Hi, Jongyoon Shin, and Min Hyung Kim. "Software-Defined Networking Orchestration for Interoperable Key Management of Quantum Key Distribution Networks." Entropy 25, no. 6 (2023): 943. http://dx.doi.org/10.3390/e25060943.

Full text
Abstract:
This paper demonstrates the use of software-defined networking (SDN) orchestration to integrate regionally separated networks in which different network parts use incompatible key management systems (KMSs) managed by different SDN controllers to ensure end-to-end QKD service provisioning to deliver the QKD keys between geographically different QKD networks. The study focuses on scenarios in which different parts of the network are managed separately by different SDN controllers, requiring an SDN orchestrator to coordinate and manage these controllers. In practical network deployments, operator
APA, Harvard, Vancouver, ISO, and other styles
4

Nadaf, Akabarsaheb Babulal, Rajeshkumar R Savaliya, Vinay Kumar Nassa, and Qaim Mehdi Rizvi. "QUANTUM KEY DISTRIBUTION IN OPTICAL COMMUNICATION NETWORKS." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3292–99. http://dx.doi.org/10.21917/ijct.2024.0489.

Full text
Abstract:
Background: Quantum Key Distribution (QKD( is a promising technology for secure communication, leveraging the principles of quantum mechanics to provide theoretically unbreakable encryption. With the exponential growth in data traffic and the increasing need for secure communication in backbone fiber networks, integrating high-bit-rate multiplexing techniques into QKD systems can enhance their efficiency and scalability. Problem: Traditional QKD systems face limitations in terms of data rate and network scalability, particularly in high-capacity optical communication networks. As data demands
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Hua, Yongli Zhao, and Avishek Nag. "Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)." Applied Sciences 9, no. 10 (2019): 2081. http://dx.doi.org/10.3390/app9102081.

Full text
Abstract:
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall arc
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xinying, Yongli Zhao, Avishek Nag, Xiaosong Yu, and Jie Zhang. "Key-Recycling Strategies in Quantum-Key-Distribution Networks." Applied Sciences 10, no. 11 (2020): 3734. http://dx.doi.org/10.3390/app10113734.

Full text
Abstract:
Quantum-key-distribution (QKD) networks can provide absolutely secure keys for the entire communication system in theory. At present, the key-distribution rate is relatively low, and the key-distribution rate decreases exponentially as the distribution distance increases. The trusted-relay scheme commonly used in existing QKD networks achieves the purpose of extending the security distance by consuming additional keys. Since the channel is unreliable, the key-relay process will accumulate system errors to a certain extent, increasing the probability of key-relay failure. In some high-bit-error
APA, Harvard, Vancouver, ISO, and other styles
7

Hearne, Shane, Jerry Horgan, Noureddine Boujnah, and Deirdre Kilbane. "Wavelength Selection for Satellite Quantum Key Distribution." Applied Sciences 15, no. 3 (2025): 1308. https://doi.org/10.3390/app15031308.

Full text
Abstract:
Current distance limitations of quantum key distribution (QKD) over fibre optic networks suggest that satellite (free-space optical) QKD networks will be required to enable global quantum communications. However, the operational availability of these systems is limited by background noise and strong attenuation caused by turbulence and adverse weather conditions. Using the decoy-state BB84 QKD protocol, we evaluate the secret key rate for a range of wavelengths, receiver sizes and initial beam waists through a variety of atmospheric conditions. We combine filtering techniques, adaptive optics,
APA, Harvard, Vancouver, ISO, and other styles
8

Stanley, M., Y. Gui, D. Unnikrishnan, S. R. G. Hall, and I. Fatadin. "Recent Progress in Quantum Key Distribution Network Deployments and Standards." Journal of Physics: Conference Series 2416, no. 1 (2022): 012001. http://dx.doi.org/10.1088/1742-6596/2416/1/012001.

Full text
Abstract:
Abstract Quantum key distribution (QKD) provides in principle unconditional security of key sharing based on the laws of physics only. In the last decade, several experimental and commercial QKD networks have been built and operated worldwide. Demonstrational applications of QKD in financial institutions, government networks, and critical infrastructures such as the power grid have been initially explored. However, large-scale deployment and full-scale commercialization of QKD networks still faces some technological and standardisation challenges. In this paper, recent developments and in-fiel
APA, Harvard, Vancouver, ISO, and other styles
9

Pedone, Ignazio, and Antonio Lioy. "Quantum Key Distribution in Kubernetes Clusters." Future Internet 14, no. 6 (2022): 160. http://dx.doi.org/10.3390/fi14060160.

Full text
Abstract:
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for QKD in several domains such as Cloud Computing and NFV. This paper extends a previous work whose main objective was to propose a new software stack, the Quantum Software Stack (QSS), to integrate QKD into software-defined infrastructures. The contribution of this paper is twofold: enhancing the previous work adding functionalities to the first v
APA, Harvard, Vancouver, ISO, and other styles
10

., Neeraj, and Anita Singhrova. "Quantum Key Distribution-based Techniques in IoT." Scientific Temper 14, no. 03 (2023): 1008–13. http://dx.doi.org/10.58414/scientifictemper.2023.14.3.69.

Full text
Abstract:
Quantum key distribution (QKD) is a cryptographic technique that creates a secure channel of communication between two parties by applying the ideas of quantum physics. QKD ensures the confidentiality and integrity of data transmission by providing a unique key that the intended recipient can only access. Secure communication has become paramount with the proliferation of IoT (Internet of Things) devices. IoT devices have confined computational power and storage, making them vulnerable to attacks. QKD provides a safe and efficient solution for securing communication between IoT devices. This p
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Zhenhua, Tianqi Dou, Yuheng Xie, et al. "Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis." Entropy 27, no. 7 (2025): 737. https://doi.org/10.3390/e27070737.

Full text
Abstract:
The mode pairing quantum key distribution (MP-QKD) protocol has attracted considerable attention for its capability to ensure high secure key rates over long distances without requiring global phase locking. However, ensuring symmetric channels for the MP-QKD protocol is challenging in practical quantum communication networks. Previous studies on the asymmetric MP-QKD protocol have relied on ideal decoy state assumptions and infinite-key analysis, which are unattainable for real-world deployment. In this paper, we conduct a security analysis of the asymmetric MP-QKD protocol with the finite-ke
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Jing, and Bernardo A. Huberman. "An Overview on Deployment Strategies for Global Quantum Key Distribution Networks." Wireless Communications and Mobile Computing 2022 (April 25, 2022): 1–15. http://dx.doi.org/10.1155/2022/9927255.

Full text
Abstract:
We present a comprehensive literature review and comparative study on the deployment strategies of quantum key distribution (QKD) networks for global coverage. The state-of-the-art deployment strategies, including terrestrial QKD via optical fibers, free-space QKD via ground-based fixed links and ground-to-air dynamic links, and satellite QKD, are reviewed and compared in terms of channel loss, interference, distance limit, connection topology, and deployment cost. Selection criteria and deployment strategies are developed to enable a global coverage of QKD networks from intercontinental, long
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Jing, and Bernardo A. Huberman. "An Overview on Deployment Strategies for Global Quantum Key Distribution Networks." Wireless Communications and Mobile Computing 2022 (April 25, 2022): 1–15. http://dx.doi.org/10.1155/2022/9927255.

Full text
Abstract:
We present a comprehensive literature review and comparative study on the deployment strategies of quantum key distribution (QKD) networks for global coverage. The state-of-the-art deployment strategies, including terrestrial QKD via optical fibers, free-space QKD via ground-based fixed links and ground-to-air dynamic links, and satellite QKD, are reviewed and compared in terms of channel loss, interference, distance limit, connection topology, and deployment cost. Selection criteria and deployment strategies are developed to enable a global coverage of QKD networks from intercontinental, long
APA, Harvard, Vancouver, ISO, and other styles
14

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security." Applied Sciences 11, no. 9 (2021): 3767. http://dx.doi.org/10.3390/app11093767.

Full text
Abstract:
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communicati
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Jing, and Bernardo A. Huberman. "Deployment Strategies for the Global Coverage of Quantum Key Distribution Network." Revista Abierta de Informática Aplicada 6, no. 1 (2022): 9–30. http://dx.doi.org/10.59471/raia20229.

Full text
Abstract:
We present a comprehensive literature review and comparative study on the deployment strategies of quantum key distribution (QKD) networks for global coverage. The state-of-the-art deployment strategies, including terrestrial QKD via optical fibers, free-space QKD via ground-based fixed links and ground-to-air dynamic links, as well as satellite QKD, are reviewed and compared in terms of channel loss, interference, distance limit, connection topology, and deployment cost. Selection criteria and deployment strategies are developed to enable a global coverage of QKD networks from intercontinenta
APA, Harvard, Vancouver, ISO, and other styles
16

Lizama-Perez, Luis Adrián, and J. M. López-Romero. "Loop-Back Quantum Key Distribution (QKD) for Secure and Scalable Multi-Node Quantum Networks." Symmetry 17, no. 4 (2025): 521. https://doi.org/10.3390/sym17040521.

Full text
Abstract:
Quantum key distribution (QKD) is a cornerstone of secure communication in the quantum era, yet most existing protocols are designed for point-to-point transmission, limiting their scalability in networked environments. In this work, we introduce Loop-Back QKD, a novel QKD protocol that supports both two-party linear configurations and scalable multiuser ring topologies. By leveraging a structured turn-based mechanism and bidirectional pulse propagation, the protocol enables efficient key distribution while reducing the quantum bit error rate (QBER) through a multi-pulse approach. Unlike trust
APA, Harvard, Vancouver, ISO, and other styles
17

Edwards, Andrew, Yee Wei Law, Ronald Mulinde, and Jill Slay. "Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 67–76. http://dx.doi.org/10.34190/iccws.18.1.982.

Full text
Abstract:
There has been a dramatic increase in the number of Internet of Things (IoT) devices and their applications. Furthermore, there is a growing impetus to integrate IoT networks on a global scale, using satellites to expand the range of IoT connectivity into geographically remote areas. Ensuring the security of satellite backhaul for IoT networks is thus of paramount importance. The steady advance of quantum computing in recent years threatens to nullify classical cryptographic approaches based on assumptions of computational hardness, motivating the need for post-quantum cryptography. Quantum co
APA, Harvard, Vancouver, ISO, and other styles
18

Bae, Sunghyun, and Seok-Tae Koh. "Optical Link Design for Quantum Key Distribution-Integrated Optical Access Networks." Photonics 12, no. 5 (2025): 418. https://doi.org/10.3390/photonics12050418.

Full text
Abstract:
To achieve commercial scalability, fiber-based quantum key distribution (QKD) systems must be integrated into existing optical communication infrastructures, rather than deployed exclusively on dedicated dark fibers. Integrating QKD into optical access networks (OANs) would be particularly advantageous, as these networks provide direct connectivity to end users for whom security is critical. Such integration can address the inherent security vulnerabilities in current OANs, which are primarily based on time-division multiplexing passive optical networks (TDM-PONs). However, integrating QKD int
APA, Harvard, Vancouver, ISO, and other styles
19

Motaharifar, Mobin, Mahmood Hasani, and Hassan Kaatuzian. "A Survey on Continuous Variable Quantum Key Distribution for Secure Data Transmission: Toward the Future of Secured Quantum-Networks." Quantum Information & Computation 25, no. 2 (2025): 175–94. https://doi.org/10.2478/qic-2025-0009.

Full text
Abstract:
Abstract Quantum key distribution (QKD) represents a cornerstone of secure communication in the quantum era. While discrete-variable QKD (DV-QKD) protocols were historically the first to demonstrate secure key exchange, continuous-variable QKD (CV-QKD) has emerged as a more practical alternative due to its seamless compatibility with current telecommunications infrastructure. CV-QKD relies on coherent and squeezed states of light, offering significant advantages for integration into modern optical networks. This review comprehensively explores the theoretical underpinnings, technological advan
APA, Harvard, Vancouver, ISO, and other styles
20

Wu, Xiaoliang, Bo Zhang, Gong Chen, and Dong Jin. "A Scalable Quantum Key Distribution Network Testbed Using Parallel Discrete-Event Simulation." ACM Transactions on Modeling and Computer Simulation 32, no. 2 (2022): 1–22. http://dx.doi.org/10.1145/3490029.

Full text
Abstract:
Quantum key distribution (QKD) has been promoted as a means for secure communications. Although QKD has been widely implemented in many urban fiber networks, the large-scale deployment of QKD remains challenging. Today, researchers extensively conduct simulation-based evaluations for their designs and applications of large-scale QKD networks for cost efficiency. However, the existing discrete-event simulators offer models for QKD hardware and protocols based on sequential event execution, which limits the scale of the experiments. In this work, we explore parallel simulation of QKD networks to
APA, Harvard, Vancouver, ISO, and other styles
21

Paglierani, Pietro, Amir Hossein Fahim Raouf, Konstantinos Pelekanakis, Roberto Petroccia, João Alves, and Murat Uysal. "A Primer on Underwater Quantum Key Distribution." Quantum Engineering 2023 (December 23, 2023): 1–26. http://dx.doi.org/10.1155/2023/7185329.

Full text
Abstract:
The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently, underwater cryptosystems mostly adopt symmetric ciphers, which are considered computationally quantum robust but pose the challenge of distributing the secret key upfront. Post-quantum public-key (PQPK) protocols promise to overcome the key dist
APA, Harvard, Vancouver, ISO, and other styles
22

Guo, Yushen, Pengzhi Yin, and Duan Huang. "One-Pixel Attack for Continuous-Variable Quantum Key Distribution Systems." Photonics 10, no. 2 (2023): 129. http://dx.doi.org/10.3390/photonics10020129.

Full text
Abstract:
Deep neural networks (DNNs) have been employed in continuous-variable quantum key distribution (CV-QKD) systems as attacking detection portions of defense countermeasures. However, the vulnerability of DNNs leaves security loopholes for hacking attacks, for example, adversarial attacks. In this paper, we propose to implement the one-pixel attack in CV-QKD attack detection networks and accomplish the misclassification on a minimum perturbation. This approach is based on the differential evolution, which makes our attack algorithm fool multiple DNNs with the minimal inner information of target n
APA, Harvard, Vancouver, ISO, and other styles
23

LI Siying, ZHU Shun, HU Feifei, et al. "Improved source-correlated quantum key distribution." Acta Physica Sinica 74, no. 14 (2025): 0. https://doi.org/10.7498/aps.74.20250268.

Full text
Abstract:
Quantum key distribution (QKD) offers unconditional security for remote communication based on the fundamental principles of quantum mechanics. However, existing QKD with correlated sources protocols suffer from limited tolerance to source correlation, which significantly degrades the key generation rate and restricts the secure transmission distance, thereby limiting their practical deployment. In this work, we propose an improved QKD with correlated sources protocol that overcomes these limitations by discarding the traditional loss-tolerant security framework. Instead, our approach adopts t
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Kailu, Jingyang Liu, Huajian Ding, Xingyu Zhou, Chunhui Zhang, and Qin Wang. "Asymmetric Measurement-Device-Independent Quantum Key Distribution through Advantage Distillation." Entropy 25, no. 8 (2023): 1174. http://dx.doi.org/10.3390/e25081174.

Full text
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) completely closes the security loopholes caused by the imperfection of devices at the detection terminal. Commonly, a symmetric MDI-QKD model is widely used in simulations and experiments. This scenario is far from a real quantum network, where the losses of channels connecting each user are quite different. To adapt such a feature, an asymmetric MDI-QKD model is proposed. How to improve the performance of asymmetric MDI-QKD also becomes an important research direction. In this work, an advantage distillation (AD) method is appl
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Qin, Yikai Liu, Xiaosong Yu, Yongli Zhao, and Jie Zhang. "Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays." Photonics 9, no. 4 (2022): 239. http://dx.doi.org/10.3390/photonics9040239.

Full text
Abstract:
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be unconditionally secure. The BB84 protocol first describes the method of transmitting information by photon polarization state, and it expounds the transmission process of services between trusted relays. However, due to the defects of real experimental devices, there are security vulnerabilities in QKD in a real system. The birth of measurement-device-i
APA, Harvard, Vancouver, ISO, and other styles
26

Yu, Xiaosong, Xian Ning, Qingcheng Zhu, et al. "Multi-Dimensional Routing, Wavelength, and Timeslot Allocation (RWTA) in Quantum Key Distribution Optical Networks (QKD-ON)." Applied Sciences 11, no. 1 (2020): 348. http://dx.doi.org/10.3390/app11010348.

Full text
Abstract:
Currently, with the continuous advancement of network and communication technology, the amount of data carried by the optical network is very huge. The security of high-speed and large-capacity information in optical networks has attracted more and more attention. Quantum key distribution (QKD) provides information-theoretic security based on the laws of quantum mechanics. Introducing QKD into an optical network can greatly improve the security of the optical network. In order to reduce the cost of deployment on QKD infrastructure, quantum signals in QKD and classical signals in optical networ
APA, Harvard, Vancouver, ISO, and other styles
27

Pederzolli, Federico, Francescomaria Faticanti, and Domenico Siracusa. "Optimal Design of Practical Quantum Key Distribution Backbones for Securing CoreTransport Networks." Quantum Reports 2, no. 1 (2020): 114–25. http://dx.doi.org/10.3390/quantum2010009.

Full text
Abstract:
We describe two mixed-integer linear programming formulations, one a faster version of a previous proposal, the other a slower but better performing new model, for the design of Quantum Key Distribution (QKD) sub-networks dimensioned to secure existing core fiber plants. We exploit existing technologies, including non-quantum repeater nodes and multiple disjoint QKD paths to overcome reach limitations while maintaining security guarantees. We examine the models’ performance using simulations on both synthetic and real topologies, quantifying their time and resulting QKD network cost compared t
APA, Harvard, Vancouver, ISO, and other styles
28

Mohammed. I. Alghamdi. "A Review on Quantum Key Distribution for Wireless Networks: Current Status and Future Prospects." Communications on Applied Nonlinear Analysis 32, no. 2s (2024): 568–79. https://doi.org/10.52783/cana.v32.2516.

Full text
Abstract:
As wireless networks become increasingly integral to modern communication infrastructures, the need for robust security mechanisms to protect sensitive information has never been more critical. Quantum Key Distribution (QKD) presents a revolutionary approach to secure communications by leveraging the principles of quantum mechanics to ensure the theoretical unbreakability of cryptographic keys. This study provides a comprehensive review of the current status of QKD technologies within the context of wireless networks, utilizing secondary data sources to analyze recent advancements, implementat
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Wen-Fei, Yi-Zheng Zhen, Yu-Lin Zheng, et al. "Open-Destination Measurement-Device-Independent Quantum Key Distribution Network." Entropy 22, no. 10 (2020): 1083. http://dx.doi.org/10.3390/e22101083.

Full text
Abstract:
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where t
APA, Harvard, Vancouver, ISO, and other styles
30

Lizama-Pérez, Luis Adrián, and José Mauricio López-Romero. "Perfect Reconciliation in Quantum Key Distribution with Order-Two Frames." Symmetry 13, no. 9 (2021): 1672. http://dx.doi.org/10.3390/sym13091672.

Full text
Abstract:
We present an error reconciliation method for Quantum Key Distribution (QKD) that corrects 100% of errors generated in regular binary frames transmitted over a noisy quantum channel regardless of the quantum channel error rate. In a previous investigation, we introduced a novel distillation QKD algorithm whose secret key rate descends linearly with respect to the channel error rate. Now, as the main achievement of this work, we demonstrate an improved algorithm capable of retaining almost all the secret information enclosed in the regular binary frames. Remarkably, this technique increases qua
APA, Harvard, Vancouver, ISO, and other styles
31

Zhao, Tao, Xiaodong Fan, Bowen Dong, Quanhao Niu, and Banghong Guo. "A Resource-Adaptive Routing Scheme with Wavelength Conflicts in Quantum Key Distribution Optical Networks." Entropy 25, no. 5 (2023): 732. http://dx.doi.org/10.3390/e25050732.

Full text
Abstract:
Quantum key distribution (QKD) has great potential in ensuring data security. Deploying QKD-related devices in existing optical fiber networks is a cost-effective way to practically implement QKD. However, QKD optical networks (QKDON) have a low quantum key generation rate and limited wavelength channels for data transmission. The simultaneous arrival of multiple QKD services may also lead to wavelength conflicts in QKDON. Therefore, we propose a resource-adaptive routing scheme (RAWC) with wavelength conflicts to achieve load balancing and efficient utilization of network resources. Focusing
APA, Harvard, Vancouver, ISO, and other styles
32

Manzalini, Antonio, and Michele Amoretti. "End-to-End Entanglement Generation Strategies: Capacity Bounds and Impact on Quantum Key Distribution." Quantum Reports 4, no. 3 (2022): 251–63. http://dx.doi.org/10.3390/quantum4030017.

Full text
Abstract:
A first quantum revolution has already brought quantum technologies into our everyday life for decades: in fact, electronics and optics are based on the quantum mechanical principles. Today, a second quantum revolution is underway, leveraging the quantum principles of superposition, entanglement and measurement, which were not fully exploited yet. International innovation activities and standardization bodies have identified four main application areas for quantum technologies and services: quantum secure communications, quantum computing, quantum simulation, and quantum sensing and metrology.
APA, Harvard, Vancouver, ISO, and other styles
33

Devi Rahmayanti. "Quantum Key Distribution (QKD) as a Wireless Telecommunications Security Solution." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 10–33. https://doi.org/10.55606/jitek.v5i1.5765.

Full text
Abstract:
The purpose of this research is to analyze and explore quantum theorems as a wireless telecommunications security solution in the future. This study uses a quantitative approach through simulation and performance analysis of QKD systems in wireless channels, by combining literature studies and comparative analysis between QKD and PQC. Meanwhile, the wireless communication simulation model, using the QKD protocol and PQC algorithm, with Free Space Optics (FSO), WiFi, and LiFi-based network scenarios. The simulation was carried out using MATLAB. This study is based on QKD, which uses BB84 and CV
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Liquan, Ziyan Zhang, Mengnan Zhao, Kunliang Yu, and Suhui Liu. "APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking." Entropy 24, no. 11 (2022): 1519. http://dx.doi.org/10.3390/e24111519.

Full text
Abstract:
As the foundation of quantum secure communication, the quantum key distribution (QKD) network is impossible to construct by using the operation mechanism of traditional networks. In the meantime, most of the existing QKD network routing schemes do not fit some specific quantum key practicality scenarios. Aiming at the special scenario of high concurrency and large differences in application requirements, we propose a new quantum key distribution network routing scheme based on application priority ranking (APR-QKDN). Firstly, the proposed APR-QKDN scheme comprehensively uses the application’s
APA, Harvard, Vancouver, ISO, and other styles
35

POPPE, A., M. PEEV, and O. MAURHART. "OUTLINE OF THE SECOQC QUANTUM-KEY-DISTRIBUTION NETWORK IN VIENNA." International Journal of Quantum Information 06, no. 02 (2008): 209–18. http://dx.doi.org/10.1142/s0219749908003529.

Full text
Abstract:
A quantum key distribution (QKD) network is currently being implemented in Vienna by integrating seven QKD-link devices that connect five subsidiaries of Siemens Austria. We give an architectural overview of the network and present the enabling QKD technologies, as well as the novel QKD network protocols.
APA, Harvard, Vancouver, ISO, and other styles
36

Dong, Hua, Yaqi Song, and Li Yang. "Wide Area Key Distribution Network Based on a Quantum Key Distribution System." Applied Sciences 9, no. 6 (2019): 1073. http://dx.doi.org/10.3390/app9061073.

Full text
Abstract:
The point-to-point quantum key distribution (QKD) system is limited by the transmission distance. So, the wide area QKD network with multiple endpoints is the research focus of this study. The relay-node scenario and key relay protocols provide the solutions to the QKD network. The early key relay protocols require the relay nodes to be reliable. Once the relay nodes become compromised, the whole network is insecure. In this paper, we extend the chain structure of the public-XOR(exclusive OR)-key scheme with two endpoints to the complex network with multiple endpoints. The relay nodes in our s
APA, Harvard, Vancouver, ISO, and other styles
37

Kodukhov, Aleksei D., Valeria A. Pastushenko, Nikita S. Kirsanov, Dmitry A. Kronberg, Markus Pflitsch, and Valerii M. Vinokur. "Boosting Quantum Key Distribution via the End-to-End Loss Control." Cryptography 7, no. 3 (2023): 38. http://dx.doi.org/10.3390/cryptography7030038.

Full text
Abstract:
With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum repeaters, cause relatively low key distribution rates in practical QKD implementations. Here, we demonstrate a remarkable improvement in the QKD performance using end-to-end line tomography for the wide class of relevant protocols. Our approach is based on the real-time detection of interventions in the transmission channel, enabling an adaptive res
APA, Harvard, Vancouver, ISO, and other styles
38

Yu, Huicun, Bangying Tang, Haolin Ding, et al. "Airborne Quantum Key Distribution Performance Analysis under Supersonic Boundary Layer." Entropy 25, no. 3 (2023): 472. http://dx.doi.org/10.3390/e25030472.

Full text
Abstract:
Airborne quantum key distribution (QKD) that can synergize with terrestrial networks and quantum satellite nodes is expected to provide flexible and relay links for the large-scale integrated communication network. However, the photon transmission rate would be randomly reduced, owing to the random distributed boundary layer that surrounding to the surface of the aircraft when the flight speed larger than Mach 0.3. Here, we investigate the airborne QKD performance with the BL effects. Furthermore, we take experimental data of supersonic BL into the model and compare the airborne QKD performanc
APA, Harvard, Vancouver, ISO, and other styles
39

Sekga, Comfort, and Mhlambululi Mafu. "Tripartite Quantum Key Distribution Implemented with Imperfect Sources." Optics 3, no. 3 (2022): 191–208. http://dx.doi.org/10.3390/opt3030019.

Full text
Abstract:
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing multipartite QKD typically assume perfect state preparation devices of legitimate users and neglect the relative rotation of reference frames. These presumptions are, nevertheless, very difficult to meet in practice, and thus the security of current multipartite QKD implementations is not guaranteed. By combining the idea of a loss tolerant techniq
APA, Harvard, Vancouver, ISO, and other styles
40

Kiktenko, Evgeniy O., Andrey Tayduganov, and Aleksey K. Fedorov. "Routing Algorithm Within the Multiple Non-Overlapping Paths’ Approach for Quantum Key Distribution Networks." Entropy 26, no. 12 (2024): 1102. https://doi.org/10.3390/e26121102.

Full text
Abstract:
We develop a novel key routing algorithm for quantum key distribution (QKD) networks that utilizes a distribution of keys between remote nodes, i.e., not directly connected by a QKD link, through multiple non-overlapping paths. This approach focuses on the security of a QKD network by minimizing potential vulnerabilities associated with individual trusted nodes. The algorithm ensures a balanced allocation of the workload across the QKD network links, while aiming for the target key generation rate between directly connected and remote nodes. We present the results of testing the algorithm on t
APA, Harvard, Vancouver, ISO, and other styles
41

Guo, Mingxuan, Yuan Cao, Jiali Zhu, et al. "Topology Abstraction-Based Routing Scheme for Secret-Key Provisioning in Hybrid GEO/LEO Quantum Satellite Networks." Entropy 25, no. 7 (2023): 1047. http://dx.doi.org/10.3390/e25071047.

Full text
Abstract:
Quantum key distribution (QKD) is a promising technique to resist the threat against quantum computers. However, the high loss of quantum signals over a long-distance optical fiber is an obstacle for QKD in the intercontinental domain. In this context, the quantum satellite network is preferred over the terrestrial quantum optical network. Due to the mobility of satellites, the satellite topology is dynamic in the quantum satellite network, which remains a challenge for routing. In hybrid geostationary-earth-orbit (GEO)/low-earth-orbit (LEO) quantum satellite networks, the lack of an efficient
APA, Harvard, Vancouver, ISO, and other styles
42

Brauer, Max, Rafael J. Vicente, Jaime S. Buruaga, et al. "Linking QKD Testbeds across Europe." Entropy 26, no. 2 (2024): 123. http://dx.doi.org/10.3390/e26020123.

Full text
Abstract:
Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD links are only emulated, the methods used can serve as a blueprint for the secure interconnection of distant QKD networks in the future. Specifically, the presented approaches combine, in a transparent
APA, Harvard, Vancouver, ISO, and other styles
43

Ali, Sellami, and Benlahcene Djaouida. "Strengthening the security of end-to-end communication in photonic networks." STUDIES IN ENGINEERING AND EXACT SCIENCES 5, no. 2 (2024): e5437. http://dx.doi.org/10.54021/seesv5n2-010.

Full text
Abstract:
The burgeoning Internet and Internet-of-Things (IoT) sectors necessitate robust cryptographic methods to ensure data security, integrity, and authentication over unsecured networks. Traditional public key cryptography, reliant on computationally hard problems, faces threats from quantum computing advancements. Quantum Key Distribution (QKD) presents a solution through the generation of unconditionally secure cryptographic keys using quantum mechanics. This paper explores the enhancement of QKD protocols to establish secure end-to-end communication in photonic networks. The proposed method invo
APA, Harvard, Vancouver, ISO, and other styles
44

A. Nahi, Hayder, Akmam Majed Mousa, Ebtehal Akeel Hamed, et al. "Quantum Key Distribution For Enabling Secure Network Function Vitalization Orchestration Over A Network." Data and Metadata 4 (February 14, 2025): 202. https://doi.org/10.56294/dm2025202.

Full text
Abstract:
Quantum Key Distribution (QKD) provides an state-of-the-art solution that work toward to enhance security of network and performance contrast to conventional systems. This paper focal point on the utilize of QKD to authorize secure orchestration and authorize network functions virtualization (NFV). The QKD-based solution is contrast with presenting solutions utilizing applying science and security KPIs.The outcomes display that the QKD solution exceed conventional solutions, with throughput stretch out 250 Mbit/s contrast to 150 Mbit/s, and response time of 4 ms versus 10 ms. The bit error rat
APA, Harvard, Vancouver, ISO, and other styles
45

Okey, Ogobuchi Daniel, Siti Sarah Maidin, Renata Lopes Rosa, et al. "Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks." Sustainability 14, no. 23 (2022): 15901. http://dx.doi.org/10.3390/su142315901.

Full text
Abstract:
In next-generation networks, including the sixth generation (6G), a large number of computing devices can communicate with ultra-low latency. By implication, 6G capabilities present a massive benefit for the Internet of Things (IoT), considering a wide range of application domains. However, some security concerns in the IoT involving authentication and encryption protocols are currently under investigation. Thus, mechanisms implementing quantum communications in IoT devices have been explored to offer improved security. Algorithmic solutions that enable better quantum key distribution (QKD) se
APA, Harvard, Vancouver, ISO, and other styles
46

Neto Mendes, Pedro, Paulo André, and Emmanuel Zambrini Cruzeiro. "Simple portable quantum key distribution for science outreach." American Journal of Physics 93, no. 1 (2025): 69–77. https://doi.org/10.1119/5.0204077.

Full text
Abstract:
Quantum key distribution (QKD) has become an essential technology in the realm of secure communication, with applications ranging from secure data transmission to quantum networks. This paper presents a simple, compact, and cost-effective setup for undergraduate tutorial demonstrations of QKD. It relies on using weak coherent pulses, which can be readily produced using an attenuated laser. The system employs the simplified three-state BB84 protocol in free space, with states encoded using linear polarization. Polarization encoding can be done passively or actively, depending on the budget avai
APA, Harvard, Vancouver, ISO, and other styles
47

Shelar, Pooja Ashok, Parikshit Narendra Mahalle, Gitanjali Rahul Shinde, and Namrata N. Wasatkar. "Enhanced Quantum Key Distribution Algorithm for Underwater Optical Wireless Sensor Network." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 392–407. http://dx.doi.org/10.17762/ijritcc.v11i7s.7015.

Full text
Abstract:
The research aims to develop an attack-free underwater optical communication channel at a distance of 50 meters. In this work, we have emphasized the importance of Quantum Key Distribution (QKD) in Naval and many other applications. An in-detail study of the Benette Brassard QKD protocol proposed in 1984 [BB84] is done with its implementation. Then as the next step, we analyzed the drawbacks of BB84 and the necessity of QKD in Underwater Optical Wireless Sensor Networks [UO-WSN]. As a solution, to identified problems, we have proposed the Enhanced BB84 protocol (EBB84) with considerations of i
APA, Harvard, Vancouver, ISO, and other styles
48

Cao, Yuan, Yongli Zhao, Yu Wu, Xiaosong Yu, and Jie Zhang. "Time-Scheduled Quantum Key Distribution (QKD) Over WDM Networks." Journal of Lightwave Technology 36, no. 16 (2018): 3382–95. http://dx.doi.org/10.1109/jlt.2018.2834949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cao, Yuan, Yongli Zhao, Jianquan Wang, Xiaosong Yu, Zhangchao Ma, and Jie Zhang. "Cost-Efficient Quantum Key Distribution (QKD) Over WDM Networks." Journal of Optical Communications and Networking 11, no. 6 (2019): 285. http://dx.doi.org/10.1364/jocn.11.000285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gomathy, K., K. S. Mohanasathiya, and K. Gomathy. "Security Challenges in Quantum Key Distribution and Robust Cryptographic Methods for Wireless Body Sensor Networks: A Comprehensive Survey." Journal of Neonatal Surgery 14, no. 7S (2025): 515–28. https://doi.org/10.52783/jns.v14.2447.

Full text
Abstract:
Wireless Body Sensor Networks (WBSNs) and Quantum Key Distribution (QKD) provide distinct yet interrelated possibilities and challenges in the quickly changing field of network safety. This review explores the safety concerns that come with quantum key distribution (QKD), emphasizing problems like quantum surveillance, protocol weaknesses, and the necessity of workable application solutions. Simultaneously, it examines the strong cryptographic techniques necessary to protect Wireless Body Sensor Networks, which are becoming increasingly important in applications related to individual tracking
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!