To see the other types of publications on this topic, follow the link: Quantum key distribution (QKD).

Journal articles on the topic 'Quantum key distribution (QKD)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Quantum key distribution (QKD).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gyongyosi, Laszlo, Laszlo Bacsardi, and Sandor Imre. "A Survey on Quantum Key Distribution." Infocommunications journal, no. 2 (2019): 14–21. http://dx.doi.org/10.36244/icj.2019.2.2.

Full text
Abstract:
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. QKD schemes enable legal parties to establish unconditionally secret communication by exploiting the fundamental attributes of quantum mechanics. Here we present an overview of QKD rotocols. We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Jie, Bowen Dong, Le Kang, Huanwen Xie, and Banghong Guo. "Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks." Entropy 25, no. 4 (2023): 661. http://dx.doi.org/10.3390/e25040661.

Full text
Abstract:
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network. We developed a novel Hybrid-QKD-Network-Cost (HQNC) heuristic algorithm to solve the cost optimization problem. Simulations verified that the scheme in this paper could save the cost by over 50 percent and 90 percent, respectively.
APA, Harvard, Vancouver, ISO, and other styles
3

Asoke Nath, Shreya Maity, Soham Banerjee, and Rohit Roy. "Quantum Key Distribution (QKD) for Symmetric Key Transfer." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 270–80. http://dx.doi.org/10.32628/cseit24103105.

Full text
Abstract:
Classical cryptographic systems are increasingly challenged by advances in computing power and new algorithmic techniques, particularly with the rise of quantum computing, which threatens the security of current encryption methods. This has spurred interest in quantum-resistant cryptography, aimed at creating algorithms that can withstand attacks from quantum computers. Traditionally, secure key transport over alternate channels has been a significant challenge, but quantum mechanics offers a solution. Quantum Key Distribution (QKD) is a revolutionary method for secure communication that leverages quantum principles. Unlike traditional methods, QKD provides unconditional security, with key security ensured by the laws of physics rather than computational difficulty. The BB84 protocol, introduced in 1984 by Bennett and Brassard, is a leading QKD scheme known for its simplicity and effectiveness in generating eavesdropping-resistant cryptographic keys. It facilitates secure key transport over alternate channels. This documentation aims to advance QKD security by practically implementing and analyzing the BB84 protocol. Through detailed theoretical analysis, simulation studies, and experimental validation, the practical impacts, and limitations of BB84-based QKD systems are examined. Additionally, a practical implementation of quantum key distribution using a sudoku key demonstrates the process's simplicity and effectiveness. These findings are expected to pave new paths in the field of cryptanalysis in the emerging Quantum Age.
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Sellami. "DECOY STATE QUANTUM KEY DISTRIBUTION." IIUM Engineering Journal 10, no. 2 (2010): 81–86. http://dx.doi.org/10.31436/iiumej.v10i2.8.

Full text
Abstract:
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Qiang, Yinming Huang, Yongqiang Du, et al. "Advances in Chip-Based Quantum Key Distribution." Entropy 24, no. 10 (2022): 1334. http://dx.doi.org/10.3390/e24101334.

Full text
Abstract:
Quantum key distribution (QKD), guaranteed by the principles of quantum mechanics, is one of the most promising solutions for the future of secure communication. Integrated quantum photonics provides a stable, compact, and robust platform for the implementation of complex photonic circuits amenable to mass manufacture, and also allows for the generation, detection, and processing of quantum states of light at a growing system’s scale, functionality, and complexity. Integrated quantum photonics provides a compelling technology for the integration of QKD systems. In this review, we summarize the advances in integrated QKD systems, including integrated photon sources, detectors, and encoding and decoding components for QKD implements. Complete demonstrations of various QKD schemes based on integrated photonic chips are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Trizna, Anastasija, and Andris Ozols. "An Overview of Quantum Key Distribution Protocols." Information Technology and Management Science 21 (December 14, 2018): 37–44. http://dx.doi.org/10.7250/itms-2018-0005.

Full text
Abstract:
Quantum key distribution (QKD) is the objects of close attention and rapid progress due to the fact that once first quantum computers are available – classical cryptography systems will become partially or completely insecure. The potential threat to today’s information security cannot be neglected, and efficient quantum computing algorithms already exist. Quantum cryptography brings a completely new level of security and is based on quantum physics principles, comparing with the classical systems that rely on hard mathematical problems. The aim of the article is to overview QKD and the most conspicuous and prominent QKD protocols, their workflow and security basement. The article covers 17 QKD protocols and each introduces novel ideas for further QKD system improvement.
APA, Harvard, Vancouver, ISO, and other styles
7

LU, HUA, and QING-YU CAI. "QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE." International Journal of Quantum Information 06, no. 06 (2008): 1195–202. http://dx.doi.org/10.1142/s0219749908004353.

Full text
Abstract:
It seems that quantum key distribution (QKD) may be completely insecure when the message sender Alice always encodes her key bits in a fixed basis. In this paper, we present a QKD protocol with classical Alice, i.e. Alice always encodes her key bit in the {|0〉,|1〉} basis (we call it classical {0,1} basis) and the eavesdropper Eve knows this fact. We prove that our protocol is completely robust against any eavesdropping attack and present the amount of tolerable noise against Eve's individual attack. Next, we present a QKD protocol to demonstrate that secure key bits can be distributed even if neither Alice nor Bob has quantum capacities, and extend this idea to a QKD network protocol with numerous parties who have only classical capacities. Finally, we discuss that quantum is necessary in QKD for security reasons, but both Alice and Bob may be classical.
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Xiao Qiang, Cui Ling Luo, and Yan Yan. "Study on Quantum Key Distribution." Applied Mechanics and Materials 275-277 (January 2013): 2515–18. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2515.

Full text
Abstract:
Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. QKD is a research hotspot of international academia in recent years. We introduce some protocols: BB84 protocol, E91 protocol, SARG04 protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Jiameng, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, and Nan Chen. "An Efficient Routing Protocol for Quantum Key Distribution Networks." Entropy 24, no. 7 (2022): 911. http://dx.doi.org/10.3390/e24070911.

Full text
Abstract:
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do not account for the state of quantum secure keys on links, applying them in QKD networks directly will result in underutilization of quantum secure keys. Therefore, an efficient routing protocol for QKD networks, especially for large-scale QKD networks, is desperately needed. In this study, an efficient routing protocol based on optimized link-state routing, namely QOLSR, is proposed for QKD networks. QOLSR considerably improves quantum key utilization in QKD networks through link-state awareness and path optimization. Simulation results demonstrate the validity and efficiency of the proposed QOLSR routing protocol. Most importantly, with the growth of communication traffic, the benefit becomes even more apparent.
APA, Harvard, Vancouver, ISO, and other styles
10

Gui, Y., D. Unnikrishnan, M. Stanley, and I. Fatadin. "Metrology Challenges in Quantum Key Distribution." Journal of Physics: Conference Series 2416, no. 1 (2022): 012005. http://dx.doi.org/10.1088/1742-6596/2416/1/012005.

Full text
Abstract:
Abstract The metrology of the QKD devices and systems grows increasingly important in recent years not only because of the needs for conformance and performance testing in the standardization, but more importantly, imperfect implementation of the devices and systems or deviations from the theoretical models, which could be exploited by eavesdropper, should be carefully characterised to avoid the so-called side channel attack. In this paper, we review the recent advances in many aspects of the QKD metrology in both fibre based QKD and free space QKD systems, including a cutting edge metrology facility development and application, traceable calibration methods, and practical device characterising technologies, all of which have been contributed by the metrology communities and relative institutions.
APA, Harvard, Vancouver, ISO, and other styles
11

., Neeraj, and Anita Singhrova. "Quantum Key Distribution-based Techniques in IoT." Scientific Temper 14, no. 03 (2023): 1008–13. http://dx.doi.org/10.58414/scientifictemper.2023.14.3.69.

Full text
Abstract:
Quantum key distribution (QKD) is a cryptographic technique that creates a secure channel of communication between two parties by applying the ideas of quantum physics. QKD ensures the confidentiality and integrity of data transmission by providing a unique key that the intended recipient can only access. Secure communication has become paramount with the proliferation of IoT (Internet of Things) devices. IoT devices have confined computational power and storage, making them vulnerable to attacks. QKD provides a safe and efficient solution for securing communication between IoT devices. This paper examines how QKD can be utilized in IoT, discussing its benefits and limitations, followed by the discussion on various QKD protocols suitable for IoT devices. In addition, the paper demonstrates that QKD is a promising solution for securing IoT communication, and its adoption significantly enhances the security and reliability of IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Hwang, Tzonelih, Chia-Wei Tsai, and Song-Kong Chong. "Probabilistic quantum key distribution." Quantum Information and Computation 11, no. 7&8 (2011): 615–37. http://dx.doi.org/10.26421/qic11.7-8-6.

Full text
Abstract:
This work presents a new concept in quantum key distribution called the probabilistic quantum key distribution (PQKD) protocol, which is based on the measurement uncertainty in quantum phenomena. It allows two mutually untrusted communicants to negotiate an unpredictable key that has a randomness guaranteed by the laws of quantum mechanics. In contrast to conventional QKD (e.g., BB84) in which one communicant has to trust the other for key distribution or quantum key agreement (QKA) in which the communicants have to artificially contribute subkeys to a negotiating key, PQKD is a natural and simple method for distributing a secure random key. The communicants in the illustrated PQKD take Einstein-Podolsky-Rosen (EPR) pairs as quantum resources and then use entanglement swapping and Bell-measurements to negotiate an unpredictable key.
APA, Harvard, Vancouver, ISO, and other styles
13

GUAN, D. J., YUAN-JIUN WANG, and E. S. ZHUANG. "QUANTUM KEY EVOLUTION AND ITS APPLICATIONS." International Journal of Quantum Information 10, no. 04 (2012): 1250044. http://dx.doi.org/10.1142/s021974991250044x.

Full text
Abstract:
Quantum key distribution (QKD) enables two authenticated parties to share a perfectly secure key. However, repeatedly using the same key to encrypt many different messages is not perfectly secure. A trivial method to update the key is to use QKD to re-establish a new key for each message. In this paper, we present a method, called quantum key evolution (QKE), to update the secret key using less qubits. Hence, it is more efficient for long messages. More precisely, we present a secure and efficient protocol, called quantum message transmission (QMT) protocol, to transmit long secret message using less qubits than the methods of incorporating QKD with one-time pad, as well as some quantum secure direct communication (QSDC) protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

Hearne, Shane, Jerry Horgan, Noureddine Boujnah, and Deirdre Kilbane. "Wavelength Selection for Satellite Quantum Key Distribution." Applied Sciences 15, no. 3 (2025): 1308. https://doi.org/10.3390/app15031308.

Full text
Abstract:
Current distance limitations of quantum key distribution (QKD) over fibre optic networks suggest that satellite (free-space optical) QKD networks will be required to enable global quantum communications. However, the operational availability of these systems is limited by background noise and strong attenuation caused by turbulence and adverse weather conditions. Using the decoy-state BB84 QKD protocol, we evaluate the secret key rate for a range of wavelengths, receiver sizes and initial beam waists through a variety of atmospheric conditions. We combine filtering techniques, adaptive optics, and wavelength selection to optimize the performance of satellite QKD. This study is simulation-based.
APA, Harvard, Vancouver, ISO, and other styles
15

A. Qaisi, Harith, and M. F. Al-Gailani. "EVALUATION OF QUANTUM KEY DISTRIBUTION BY SIMULATION." Iraqi Journal of Information and Communication Technology 5, no. 3 (2022): 15–22. http://dx.doi.org/10.31987/ijict.5.3.157.

Full text
Abstract:
Quantum key distribution is a secure method for exchanging keys across communication entities. The first quantum key distribution (QKD) protocol, BB84, was introduced in 1984. The primary paradigm of QKD was initiated for a depolarizing channel. This paper demonstrates the ability to use MATLAB to simulate QKD. It has been found that the security of the QKD protocol depends on a variety of factors, including the amount of photon input and the severity of the Eve attacks. It turned out that the high level of Eve’s attack, according to the data, indicates a lack of protection.
APA, Harvard, Vancouver, ISO, and other styles
16

Ramakrishna Kolikipogu. "Advancing Quantum Key Distribution: Challenges, Trends, and Future Prospects." Journal of Information Systems Engineering and Management 10, no. 27s (2025): 237–48. https://doi.org/10.52783/jisem.v10i27s.4401.

Full text
Abstract:
The quantum Key Distribution (QKD) is a cryptographical approach that practices quantum mechanical properties to make entirely secured keys for safe message transmission among multiple users. Substantial advancement has been acquiring QKD models and specifications in recent years. This article systematically examines QKD models involving the diverse QKD standards, advantages, difficulties, constraints, and encounters. The article finishes with the potential scope of QKD and its probable applications.
APA, Harvard, Vancouver, ISO, and other styles
17

Nadaf, Akabarsaheb Babulal, Rajeshkumar R Savaliya, Vinay Kumar Nassa, and Qaim Mehdi Rizvi. "QUANTUM KEY DISTRIBUTION IN OPTICAL COMMUNICATION NETWORKS." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3292–99. http://dx.doi.org/10.21917/ijct.2024.0489.

Full text
Abstract:
Background: Quantum Key Distribution (QKD( is a promising technology for secure communication, leveraging the principles of quantum mechanics to provide theoretically unbreakable encryption. With the exponential growth in data traffic and the increasing need for secure communication in backbone fiber networks, integrating high-bit-rate multiplexing techniques into QKD systems can enhance their efficiency and scalability. Problem: Traditional QKD systems face limitations in terms of data rate and network scalability, particularly in high-capacity optical communication networks. As data demands increase, there is a critical need for methods that can support high-bit-rate multiplexing while maintaining the security and performance of QKD. Method: This study proposes a novel QKD approach using high-bit-rate multiplexing in backbone fiber networks. The method involves encoding quantum keys using multiple optical channels simultaneously to increase the data throughput of the QKD system. We employ a combination of time-division multiplexing (TDM( and wavelength-division multiplexing (WDM( to optimize the use of fiber resources and enhance key distribution rates. Results: Simulation results demonstrate that the proposed method achieves a key distribution rate of 10 Mbps over a 200 km fiber link with a quantum bit error rate (QBER( of 1.5%. This represents a 50% improvement in key rate compared to conventional QKD systems without multiplexing. Additionally, the method shows enhanced scalability and network utilization, supporting up to 16 multiplexed channels with minimal impact on security.
APA, Harvard, Vancouver, ISO, and other styles
18

Pedone, Ignazio, and Antonio Lioy. "Quantum Key Distribution in Kubernetes Clusters." Future Internet 14, no. 6 (2022): 160. http://dx.doi.org/10.3390/fi14060160.

Full text
Abstract:
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for QKD in several domains such as Cloud Computing and NFV. This paper extends a previous work whose main objective was to propose a new software stack, the Quantum Software Stack (QSS), to integrate QKD into software-defined infrastructures. The contribution of this paper is twofold: enhancing the previous work adding functionalities to the first version of the QSS, and presenting a practical integration of the QSS in Kubernetes, which is the de-facto standard for container orchestration.
APA, Harvard, Vancouver, ISO, and other styles
19

Buduri., Reddaiah. "Advanced Secure Communication: Exploring Quantum Key Distribution, the BB84 Method." International Journal of Engineering and Advanced Technology (IJEAT) 13, no. 4 (2024): 29–33. https://doi.org/10.35940/ijeat.D4434.13040424.

Full text
Abstract:
<strong>Abstract: </strong>One promising way to use quantum information to secure everyday communication is through the distribution of quantum keys. By exchanging a secret key, the Quantum Key Distribution (QKD) approach allows two parties to communicate securely.BB84 protocol is among the most well-known QKD protocols. In this protocol, qubits are exchanged via a quantum channel between the sender and the receiver. This enables them to produce a shared key that is impenetrable to eavesdroppers and illustrate the fundamental ideas of QKD using current simulations and implementations. The results of this study demonstrate that the BB84 protocol is a highly secure QKD technique that has been investigated in great detail and used in a variety of contexts. Additionally, over the enhancements made to the BB84 protocol such as the use of advanced error correction techniques and decoy states to increase its security and usability is discussed. With an emphasis on the BB84 protocol in secure communication technologies, this study offers an extensive analysis of QKD systems overall.
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Xinying, Yongli Zhao, Avishek Nag, Xiaosong Yu, and Jie Zhang. "Key-Recycling Strategies in Quantum-Key-Distribution Networks." Applied Sciences 10, no. 11 (2020): 3734. http://dx.doi.org/10.3390/app10113734.

Full text
Abstract:
Quantum-key-distribution (QKD) networks can provide absolutely secure keys for the entire communication system in theory. At present, the key-distribution rate is relatively low, and the key-distribution rate decreases exponentially as the distribution distance increases. The trusted-relay scheme commonly used in existing QKD networks achieves the purpose of extending the security distance by consuming additional keys. Since the channel is unreliable, the key-relay process will accumulate system errors to a certain extent, increasing the probability of key-relay failure. In some high-bit-error-rate network scenarios such as wireless networks and disaster environments, the channel-error rate is as high as 30–50%. And in these scenarios, there are usually a large number of confidential messages that need to be delivered. However, the key-management mechanism of the current QKD system does not consider the scenario of key-relay failure. If the key is not successfully relayed, all the keys participating in the relay process will be destroyed, including the key that has been successfully relayed before. This situation causes the key to be wasted and reduces the encryption capability of the system. In this paper, we proposed the quantum-key-recycling (QKR) mechanism to increase the number of keys available in the network and introduced a secure service grading mechanism to properly reuse the recycled keys. The QKR mechanism can be regarded as a key-management mechanism acting on the point-to-point QKD system, and the mechanism is designed for a classical channel to reuse the key resources. A post-processing method for recycled keys is proposed to improve the security of the keys. Simulation results show that the QKD network using the key-recycling strategy is about 20% higher in key-utilization rate than the traditional QKD network without the QKR mechanism, and about 10% higher in-service security coverage.
APA, Harvard, Vancouver, ISO, and other styles
21

Pereira, Margarida, Go Kato, Akihiro Mizutani, Marcos Curty, and Kiyoshi Tamaki. "Quantum key distribution with correlated sources." Science Advances 6, no. 37 (2020): eaaz4487. http://dx.doi.org/10.1126/sciadv.aaz4487.

Full text
Abstract:
In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.
APA, Harvard, Vancouver, ISO, and other styles
22

Cowper, Noah, Harry Shaw, and David Thayer. "Chaotic Quantum Key Distribution." Cryptography 4, no. 3 (2020): 24. http://dx.doi.org/10.3390/cryptography4030024.

Full text
Abstract:
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and synchronized chaos which was utilized to mask a transmitted message. This communication scheme is not hampered by the ability to send single photons and consequently is not vulnerable to number splitting attacks like other QKD schemes that rely on single photon emission. This was shown by an eavesdropper gaining a maximum amount of information on the key during the first setup and listening to the key reconciliation to gain more information. We proved that there is a maximum amount of information an eavesdropper can gain during the communication, and this is insufficient to decode the message.
APA, Harvard, Vancouver, ISO, and other styles
23

Joanes, Angelina. "Quantum Key Distribution Protocols: Advancements and Challenges in Secure Communication." Journal of Quantum Science and Technology 1, no. 1 (2024): 10–14. http://dx.doi.org/10.36676/jqst.v1.i1.03.

Full text
Abstract:
Quantum Key Distribution (QKD) protocols have emerged as a promising solution for secure communication, offering provable security guarantees based on the principles of quantum mechanics. an overview of recent advancements and challenges in the field of QKD protocols. We discuss key protocols such as BB84, E91, and continuous-variable QKD, highlighting their theoretical foundations and practical implementations. Furthermore, we explore recent research developments in QKD, including measurement-device-independent QKD, twin-field QKD, and satellite-based QKD. These advancements have expanded the capabilities and applicability of QKD protocols, paving the way for secure communication channels resistant to eavesdropping attacks. However, challenges such as scalability, compatibility with existing infrastructure, and vulnerability to certain attacks remain significant barriers to the widespread deployment of QKD. By addressing these challenges and continuing to innovate in the field of quantum cryptography, we can unlock the full potential of QKD protocols for ensuring the confidentiality and integrity of sensitive information exchange in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
24

Hodson, Douglas D., Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin, and Gerald Baumgartner. "Modeling quantum optics for quantum key distribution system simulation." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16, no. 1 (2017): 15–26. http://dx.doi.org/10.1177/1548512916684561.

Full text
Abstract:
This article presents the background, development, and implementation of a simulation framework used to model the quantum exchange aspects of Quantum Key Distribution (QKD) systems. The presentation of our simulation framework is novel from several perspectives, one of which is the lack of published information in this area. QKD is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to understand the impact these non-idealities have on system performance and security. To study these non-idealities we present the development of a quantum communications modeling and simulation capability. This required a suitable mathematical representation of quantum optical pulses and optical component transforms. Furthermore, we discuss how these models are implemented within our Discrete Event Simulation-based framework and show how it is used to study a variety of QKD implementations.
APA, Harvard, Vancouver, ISO, and other styles
25

Grote, Olaf, and Andreas Ahrens. "Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution." Electrical, Control and Communication Engineering 18, no. 1 (2022): 43–49. http://dx.doi.org/10.2478/ecce-2022-0006.

Full text
Abstract:
Abstract The Quantum Key Distribution (QKD) is a well-researched secure communication method for exchanging cryptographic keys only known by the shared participants. The vulnerable problem of a secret key distribution is the negotiation and the transfer over an insecure or untrusted channel. Novel further developments of the QKD communication method are part of in-field technologies and applications in communication devices, such as satellites. However, expensive physical test setups are necessary to improve new application possibilities of cryptographic protocol involving components of quantum mechanics and quantum laws of physics. Therefore, optical simulation software can play a part in essential QKD simulating and further developing quantum-based cryptosystems. In the paper, the authors consider a feasible QKD setup based on the BB84 protocol to create a symmetric key material based on achieving a linear key rate via optical simulation software. The paper still provides two experimental architecture designs to use the QKD for a cryptosystem.
APA, Harvard, Vancouver, ISO, and other styles
26

Xu, Huaxing, Shaohua Wang, Yang Huang, Yaqi Song, and Changlei Wang. "A Self-Stabilizing Phase Decoder for Quantum Key Distribution." Applied Sciences 10, no. 5 (2020): 1661. http://dx.doi.org/10.3390/app10051661.

Full text
Abstract:
Self-stabilization quantum key distribution (QKD) systems are often based on the Faraday magneto-optic effect such as “plug and play” QKD systems and Faraday–Michelson QKD systems. In this article, we propose a new anti-quantum-channel disturbance decoder for QKD without magneto-optic devices, which can be a benefit for the photonic integration and applications in magnetic environments. The decoder is based on a quarter-wave plate reflector–Michelson (Q–M) interferometer, with which the QKD system can be free of polarization disturbance caused by quantum channel and optical devices in the system. The theoretical analysis indicates that the Q–M interferometer is immune to polarization-induced signal fading, where the operator of the Q–M interferometer corresponding to Pauli Matrix σ2 makes it satisfy the anti-disturbance condition naturally. A Q–M interferometer based time-bin phase encoding QKD setup is demonstrated, and the experimental results show that the QKD setup works stably with a low quantum bit error rate about 1.3% for 10 h over 60.6 km standard telecommunication optical fiber.
APA, Harvard, Vancouver, ISO, and other styles
27

Paglierani, Pietro, Amir Hossein Fahim Raouf, Konstantinos Pelekanakis, Roberto Petroccia, João Alves, and Murat Uysal. "A Primer on Underwater Quantum Key Distribution." Quantum Engineering 2023 (December 23, 2023): 1–26. http://dx.doi.org/10.1155/2023/7185329.

Full text
Abstract:
The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently, underwater cryptosystems mostly adopt symmetric ciphers, which are considered computationally quantum robust but pose the challenge of distributing the secret key upfront. Post-quantum public-key (PQPK) protocols promise to overcome the key distribution problem. The security of PQPK protocols, however, only relies on the assumed computational complexity of some underlying mathematical problems. Moreover, the use of resource-hungry PQPK algorithms in resource-constrained environments such as UNs can require nontrivial hardware/software optimization efforts. An alternative approach is underwater quantum key distribution (QKD), which promises unconditional security built upon the physical principles of quantum mechanics (QM). This tutorial provides a basic introduction to free-space underwater QKD (UQKD). At first, the basic concepts of QKD are presented, based on a fully worked out QKD example. A thorough state-of-the-art analysis of UQKD is carried out. The paper subsequently provides a theoretical analysis of the QKD performance through free-space underwater channels and its dependence on the key optical parameters of the system and seawater. Finally, open challenges, points of strength, and perspectives of UQKD are identified and discussed.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Rui-Qiang, Zhen-Qiang Yin, Xiao-Hang Jin, et al. "Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization." Entropy 25, no. 2 (2023): 258. http://dx.doi.org/10.3390/e25020258.

Full text
Abstract:
Quantum key distribution (QKD) allows two remote parties to share information-theoretic secret keys. Many QKD protocols assume the phase of encoding state can be continuous randomized from 0 to 2π, which, however, may be questionable in the experiment. This is particularly the case in the recently proposed twin-field (TF) QKD, which has received a lot of attention since it can increase the key rate significantly and even beat some theoretical rate-loss limits. As an intuitive solution, one may introduce discrete-phase randomization instead of continuous randomization. However, a security proof for a QKD protocol with discrete-phase randomization in the finite-key region is still missing. Here, we develop a technique based on conjugate measurement and quantum state distinguishment to analyze the security in this case. Our results show that TF-QKD with a reasonable number of discrete random phases, e.g., 8 phases from {0,π/4,π/2,…,7π/4}, can achieve satisfactory performance. On the other hand, we find the finite-size effects become more notable than before, which implies that more pulses should be emit in this case. More importantly, as a the first proof for TF-QKD with discrete-phase randomization in the finite-key region, our method is also applicable in other QKD protocols.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Siyuan, Wei Mao, Shaobo Luo, and Shihai Sun. "Chip-Based Electronic System for Quantum Key Distribution." Entropy 26, no. 5 (2024): 382. http://dx.doi.org/10.3390/e26050382.

Full text
Abstract:
Quantum Key Distribution (QKD) has garnered significant attention due to its unconditional security based on the fundamental principles of quantum mechanics. While QKD has been demonstrated by various groups and commercial QKD products are available, the development of a fully chip-based QKD system, aimed at reducing costs, size, and power consumption, remains a significant technological challenge. Most researchers focus on the optical aspects, leaving the integration of the electronic components largely unexplored. In this paper, we present the design of a fully integrated electrical control chip for QKD applications. The chip, fabricated using 28 nm CMOS technology, comprises five main modules: an ARM processor for digital signal processing, delay cells for timing synchronization, ADC for sampling analog signals from monitors, OPAMP for signal amplification, and DAC for generating the required voltage for phase or intensity modulators. According to the simulations, the minimum delay is 11ps, the open-loop gain of the operational amplifier is 86.2 dB, the sampling rate of the ADC reaches 50 MHz, and the DAC achieves a high rate of 100 MHz. To the best of our knowledge, this marks the first design and evaluation of a fully integrated driver chip for QKD, holding the potential to significantly enhance QKD system performance. Thus, we believe our work could inspire future investigations toward the development of more efficient and reliable QKD systems.
APA, Harvard, Vancouver, ISO, and other styles
30

Grover, Saanvi. "Security and Efficiency of Quantum Key Distribution Protocols: A Comprehensive Review." Journal of Quantum Science and Technology 1, no. 2 (2024): 23–30. http://dx.doi.org/10.36676/jqst.v1.i2.12.

Full text
Abstract:
Quantum Key Distribution (QKD) protocols offer a revolutionary approach to secure communication, leveraging the principles of quantum mechanics to enable theoretically unbreakable encryption. This comprehensive review examines the security and efficiency of various QKD protocols, including BB84, E91, and Continuous Variable QKD. We analyze the fundamental principles underpinning these protocols, their implementation challenges, and the practical considerations for real-world deployment. Special emphasis is placed on the security proofs of QKD, addressing potential vulnerabilities such as photon number splitting attacks and detector blinding attacks. Additionally, we explore the efficiency of QKD systems in terms of key generation rates, distance limitations, and integration with existing communication infrastructures. Recent advancements in QKD technology, including satellite-based QKD and quantum repeaters, are also discussed. Our findings highlight the critical role of QKD in future-proofing communication security and the ongoing efforts to enhance its practicality and scalability. This review aims to provide a detailed understanding of the current state of QKD protocols, offering insights into their potential to transform secure communications in the quantum era.
APA, Harvard, Vancouver, ISO, and other styles
31

LI Siying, ZHU Shun, HU Feifei, et al. "Improved source-correlated quantum key distribution." Acta Physica Sinica 74, no. 14 (2025): 0. https://doi.org/10.7498/aps.74.20250268.

Full text
Abstract:
Quantum key distribution (QKD) offers unconditional security for remote communication based on the fundamental principles of quantum mechanics. However, existing QKD with correlated sources protocols suffer from limited tolerance to source correlation, which significantly degrades the key generation rate and restricts the secure transmission distance, thereby limiting their practical deployment. In this work, we propose an improved QKD with correlated sources protocol that overcomes these limitations by discarding the traditional loss-tolerant security framework. Instead, our approach adopts the standard BB84 protocol for the security analysis, under the assumption that the source correlation has a bounded range and characterized inner product of the states. We theoretically analyze the performance of the improved protocol under various levels of source correlation and channel loss. Numerical simulations show that our protocol achieves a significantly higher secret key rate and longer transmission distance compared to conventional schemes. Under typical parameters and in the case of 0 dB loss, our protocol achieves approximately a 1.5 to 3 fold improvement in secret key rate. Additionally, the maximum tolerable loss is enhanced by approximately 2 to 6 dB. This highlights a promising direction for enhancing the robustness and practicality of QKD with correlated sources systems, paving the way for their deployment in real-world quantum communication networks.
APA, Harvard, Vancouver, ISO, and other styles
32

Winick, Adam, Norbert Lütkenhaus, and Patrick J. Coles. "Reliable numerical key rates for quantum key distribution." Quantum 2 (July 26, 2018): 77. http://dx.doi.org/10.22331/q-2018-07-26-77.

Full text
Abstract:
In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our approach by finding higher key rates than those previously reported in the literature for several interesting scenarios (e.g., the Trojan-horse attack and the phase-coherent BB84 protocol). Our method will ultimately improve our ability to automate key rate calculations and, hence, to develop a user-friendly software package that could be used widely by QKD researchers.
APA, Harvard, Vancouver, ISO, and other styles
33

Dong, Hua, Yaqi Song, and Li Yang. "Wide Area Key Distribution Network Based on a Quantum Key Distribution System." Applied Sciences 9, no. 6 (2019): 1073. http://dx.doi.org/10.3390/app9061073.

Full text
Abstract:
The point-to-point quantum key distribution (QKD) system is limited by the transmission distance. So, the wide area QKD network with multiple endpoints is the research focus of this study. The relay-node scenario and key relay protocols provide the solutions to the QKD network. The early key relay protocols require the relay nodes to be reliable. Once the relay nodes become compromised, the whole network is insecure. In this paper, we extend the chain structure of the public-XOR(exclusive OR)-key scheme with two endpoints to the complex network with multiple endpoints. The relay nodes in our scheme do not need encryption actions, decryption actions, or storage XOR keys, which simplifies the system compared with other key distribution schemes based on trusted relay nodes. Our scheme not only improves the practical performance and simplifies the system’s complexity, but it also ensures that the security is not reduced. Specifically, we rigorously demonstrate that an eavesdropper can never access the key shared by the users of the network as long as the process of generating XOR keys and destroying the original keys is secure. In addition, we discuss the information leakage of the practical QKD network from the perspective of the unicity distance.
APA, Harvard, Vancouver, ISO, and other styles
34

Luo, Yi, Xi Cheng, Hao-Kun Mao, and Qiong Li. "An Overview of Postprocessing in Quantum Key Distribution." Mathematics 12, no. 14 (2024): 2243. http://dx.doi.org/10.3390/math12142243.

Full text
Abstract:
Quantum key distribution (QKD) technology is a frontier in the field of secure communication, leveraging the principles of quantum mechanics to offer information-theoretically secure keys. Postprocessing is an important part of a whole QKD system because it directly impacts the secure key rate and the security of the system. In particular, with the fast increase in the photon transmission frequency in a QKD system, the processing speed of postprocessing becomes an essential issue. Our study embarks on a comprehensive review of the development of postprocessing of QKD, including five subprotocols, namely, parameter estimation, sifting, information reconciliation, privacy amplification, and channel authentication. Furthermore, we emphasize the issues raised in the implementation of these subprotocols under practical scenarios, such as limited computation or storage resources and fluctuations in channel environments. Based on the composable security theory, we demonstrate how enhancements in each subprotocol influence the secure key rate and security parameters, which can provide meaningful insights for future advancements in QKD.
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Jingyi. "A Review of Quantum Key Distribution Technology and Its Applications." Theoretical and Natural Science 92, no. 1 (2025): 101–7. https://doi.org/10.54254/2753-8818/2025.21793.

Full text
Abstract:
With the rapid development of information technology, the traditional encryption technology has gradually become fragile. Quantum key distribution (QKD) is based on the principle of quantum mechanics and has absolute security in theory, so it has attracted much attention. This paper emphasizes the importance of QKD in the field of information security. After briefly introducing the principle and practical application process of QKD technology, the differences and application scenarios of classical protocols are compared and analyzed. The applications of QKD in the fields of finance, energy and communication are summarized. In addition, it explores the potential future applications of QKD in healthcare and smart cities, providing valuable insights into the study of QKD technology and its applications.
APA, Harvard, Vancouver, ISO, and other styles
36

Meijers, Ints. "Challenges and Solutions for Secure Key Management and Monitoring: Review of the Cerberis3 Quantum Key Distribution System." Quantum Reports 6, no. 3 (2024): 426–35. http://dx.doi.org/10.3390/quantum6030027.

Full text
Abstract:
Quantum Key Distribution (QKD) offers a revolutionary approach to secure communication, leveraging the principles of quantum mechanics to generate and distribute cryptographic keys that are immune to eavesdropping. As QKD systems become more widely adopted, the need for robust monitoring and management solutions has become increasingly crucial. The Cerberis3 QKD system from ID Quantique addresses this challenge by providing a comprehensive monitoring and visualization platform. The system’s advanced features, including central configuration, SNMP integration, and the graphical visualization of key performance metrics, enable network administrators to ensure their QKD infrastructure’s reliable and secure operation. Monitoring critical parameters such as Quantum Bit Error Rate (QBER), secret key rate, and link visibility is essential for maintaining the integrity of the quantum channel and optimizing the system’s performance. The Cerberis3 system’s ability to interface with encryption vendors and support complex network topologies further enhances its versatility and integration capabilities. By addressing the unique challenges of quantum monitoring, the Cerberis3 system empowers organizations to leverage the power of QKD technology, ensuring the security of their data in the face of emerging quantum computing threats. This article explores the Cerberus3 system’s features and its role in overcoming the monitoring challenges inherent to QKD deployments.
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Hua, Yongli Zhao, and Avishek Nag. "Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)." Applied Sciences 9, no. 10 (2019): 2081. http://dx.doi.org/10.3390/app9102081.

Full text
Abstract:
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall architecture, related interfaces, and protocols. Then, three-use cases are provided as important paradigms with their corresponding schemes and simulation performances.
APA, Harvard, Vancouver, ISO, and other styles
38

ur Rehman, Junaid, Saad Qaisar, Youngmin Jeong, and Hyundong Shin. "Security of a control key in quantum key distribution." Modern Physics Letters B 31, no. 11 (2017): 1750119. http://dx.doi.org/10.1142/s0217984917501196.

Full text
Abstract:
Quantum key distribution (QKD) schemes rely on the randomness to exchange secret keys between two parties. A control key to generate the same (pseudo)-randomness for the key exchanging parties increases the key exchange rate. However, the use of pseudo-randomness where true randomness is required makes a classical system vulnerable to the known plain-text attack. Contrary to the belief of unavailability of this attack in QKD, we show that this attack is actually possible whenever a control key is employed. In this paper, we show that it is possible to make use of the uncertainty principle to not only avoid this attack, but also remove the hazards of photon-number splitting attack in quantum setting. We define the secrecy of control key based on the guessing probability, and propose a scheme to achieve this defined secrecy. We show the general applicability of our framework on the most common QKD schemes.
APA, Harvard, Vancouver, ISO, and other styles
39

POPPE, A., M. PEEV, and O. MAURHART. "OUTLINE OF THE SECOQC QUANTUM-KEY-DISTRIBUTION NETWORK IN VIENNA." International Journal of Quantum Information 06, no. 02 (2008): 209–18. http://dx.doi.org/10.1142/s0219749908003529.

Full text
Abstract:
A quantum key distribution (QKD) network is currently being implemented in Vienna by integrating seven QKD-link devices that connect five subsidiaries of Siemens Austria. We give an architectural overview of the network and present the enabling QKD technologies, as well as the novel QKD network protocols.
APA, Harvard, Vancouver, ISO, and other styles
40

Lizama-Perez, Luis Adrián, and J. M. López-Romero. "Loop-Back Quantum Key Distribution (QKD) for Secure and Scalable Multi-Node Quantum Networks." Symmetry 17, no. 4 (2025): 521. https://doi.org/10.3390/sym17040521.

Full text
Abstract:
Quantum key distribution (QKD) is a cornerstone of secure communication in the quantum era, yet most existing protocols are designed for point-to-point transmission, limiting their scalability in networked environments. In this work, we introduce Loop-Back QKD, a novel QKD protocol that supports both two-party linear configurations and scalable multiuser ring topologies. By leveraging a structured turn-based mechanism and bidirectional pulse propagation, the protocol enables efficient key distribution while reducing the quantum bit error rate (QBER) through a multi-pulse approach. Unlike trusted-node QKD networks, Loop-Back QKD eliminates intermediate-node vulnerabilities, as secret keys are never processed by intermediate nodes. Furthermore, unlike Measurement-Device-Independent (MDI-QKD) and Twin-Field QKD (TF-QKD), which require complex entanglement-based setups, Loop-Back QKD relies solely on direct polarization transformations, reducing vulnerability to side-channel attacks and practical implementation challenges. Additionally, our analysis indicates that multi-pulse Loop-Back QKD can tolerate higher QBER thresholds. However, this increased robustness comes at the cost of a lower key rate efficiency compared to standard QKD schemes. This design choice enhances its robustness against real-world adversarial threats, making it a strong candidate for secure multiuser communication in local and metropolitan-scale quantum networks.
APA, Harvard, Vancouver, ISO, and other styles
41

LO, HOI-KWONG. "DECOY STATE QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 03, supp01 (2005): 143. http://dx.doi.org/10.1142/s0219749905001328.

Full text
Abstract:
Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states—a vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", . We also have done the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", .
APA, Harvard, Vancouver, ISO, and other styles
42

Hemalatha, Badukuri, Badukuri Premalatha, and Buduri Reddaiah. "Advanced Secure Communication: Exploring Quantum Key Distribution, the BB84 Method." International Journal of Engineering and Advanced Technology 13, no. 4 (2024): 29–33. http://dx.doi.org/10.35940/ijeat.d4434.13040424.

Full text
Abstract:
One promising way to use quantum information to secure everyday communication is through the distribution of quantum keys. By exchanging a secret key, the Quantum Key Distribution (QKD) approach allows two parties to communicate securely.BB84 protocol is among the most well-known QKD protocols. In this protocol, qubits are exchanged via a quantum channel between the sender and the receiver. This enables them to produce a shared key that is impenetrable to eavesdroppers and illustrate the fundamental ideas of QKD using current simulations and implementations. The results of this study demonstrate that the BB84 protocol is a highly secure QKD technique that has been investigated in great detail and used in a variety of contexts. Additionally, over the enhancements made to the BB84 protocol such as the use of advanced error correction techniques and decoy states to increase its security and usability is discussed. With an emphasis on the BB84 protocol in secure communication technologies, this study offers an extensive analysis of QKD systems overall.
APA, Harvard, Vancouver, ISO, and other styles
43

CHOI, TAESEUNG, and MAHN-SOO CHOI. "A NEW QUANTUM KEY DISTRIBUTION PROTOCOL BASED ON QUANTUM FARADAY ROTATION." International Journal of Modern Physics B 22, no. 01n02 (2008): 82–87. http://dx.doi.org/10.1142/s0217979208046086.

Full text
Abstract:
We propose a new quantum key distribution (QKD) protocol, which exploits the maximal entanglement between home qubits and flying qubits induced by means of quantum Faraday rotation (QFR). The entanglement between the flying and home qubits provides the essential part of the security of the protocol. We also discuss possible experimental implementations, the optical cavity QED and quantum dots in microcavity, which is feasible in current spintronics technology.
APA, Harvard, Vancouver, ISO, and other styles
44

Sim, Dong-Hi, Jongyoon Shin, and Min Hyung Kim. "Software-Defined Networking Orchestration for Interoperable Key Management of Quantum Key Distribution Networks." Entropy 25, no. 6 (2023): 943. http://dx.doi.org/10.3390/e25060943.

Full text
Abstract:
This paper demonstrates the use of software-defined networking (SDN) orchestration to integrate regionally separated networks in which different network parts use incompatible key management systems (KMSs) managed by different SDN controllers to ensure end-to-end QKD service provisioning to deliver the QKD keys between geographically different QKD networks. The study focuses on scenarios in which different parts of the network are managed separately by different SDN controllers, requiring an SDN orchestrator to coordinate and manage these controllers. In practical network deployments, operators often utilize multiple vendors for their network equipment. This practice also enables the expansion of the QKD network’s coverage by interconnecting various QKD networks equipped with devices from different vendors. However, as coordinating different parts of the QKD network is a complex task, this paper proposes the implementation of an SDN orchestrator which acts as a central entity to manage multiple SDN controllers, ensuring end-to-end QKD service provisioning to address this challenge. For instance, when there are multiple border nodes to interconnect different networks, the SDN orchestrator calculates the path in advance for the end-to-end delivery of keys between initiating and target applications belonging to different networks. This path selection requires the SDN orchestrator to gather information from each SDN controller managing the respective parts of the QKD network. This work shows the practical implementation of SDN orchestration for interoperable KMS in commercial QKD networks in South Korea. By employing an SDN orchestrator, it becomes possible to coordinate multiple SDN controllers and ensure the efficient and secure delivery of QKD keys between different QKD networks with varying vendor equipment.
APA, Harvard, Vancouver, ISO, and other styles
45

Primaatmaja, Ignatius William, Cassey Crystania Liang, Gong Zhang, Jing Yan Haw, Chao Wang, and Charles Ci-Wen Lim. "Discrete-variable quantum key distribution with homodyne detection." Quantum 6 (January 3, 2022): 613. http://dx.doi.org/10.22331/q-2022-01-03-613.

Full text
Abstract:
Most quantum key distribution (QKD) protocols can be classified as either a discrete-variable (DV) protocol or continuous-variable (CV) protocol, based on how classical information is being encoded. We propose a protocol that combines the best of both worlds – the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD. Our proposed protocol has two highly practical features: (1) it does not require the honest parties to share the same reference phase (as required in CV-QKD) and (2) the selection of decoding basis can be performed after measurement. We also prove the security of the proposed protocol in the asymptotic limit under the assumption of collective attacks. Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over metropolitan distances.
APA, Harvard, Vancouver, ISO, and other styles
46

Kodukhov, Aleksei D., Valeria A. Pastushenko, Nikita S. Kirsanov, Dmitry A. Kronberg, Markus Pflitsch, and Valerii M. Vinokur. "Boosting Quantum Key Distribution via the End-to-End Loss Control." Cryptography 7, no. 3 (2023): 38. http://dx.doi.org/10.3390/cryptography7030038.

Full text
Abstract:
With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum repeaters, cause relatively low key distribution rates in practical QKD implementations. Here, we demonstrate a remarkable improvement in the QKD performance using end-to-end line tomography for the wide class of relevant protocols. Our approach is based on the real-time detection of interventions in the transmission channel, enabling an adaptive response that modifies the QKD setup and post-processing parameters, leading, thereby, to a substantial increase in the key distribution rates. Our findings provide everlastingly secure efficient quantum cryptography deployment potentially overcoming the repeaterless rate-distance limit.
APA, Harvard, Vancouver, ISO, and other styles
47

Sharma, Meenakshi, and Sonia Thind. "A Quantum Key Distribution Technique Using Quantum Cryptography." International Journal of Distributed Artificial Intelligence 11, no. 2 (2019): 1–10. http://dx.doi.org/10.4018/ijdai.2019070101.

Full text
Abstract:
In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.
APA, Harvard, Vancouver, ISO, and other styles
48

Bisztray, Tamas, and Laszlo Bacsardi. "The Evolution of Free-Space Quantum Key Distribution." Infocommunications journal, no. 1 (2018): 22–30. http://dx.doi.org/10.36244/icj.2018.1.4.

Full text
Abstract:
In this paper we are looking at the milestones that were achieved in free−space quantum key distribution as well as the current state of this technology. First a brief overview introduces the technical prerequisites that will help to better understand the rest of the paper. After looking into the first successful demonstrations of short range free space QKD both indoor and outdoor, we are examining the longer range terrestrial QKD experiments. In the next step we look at some experiments that were aiming to take free space QKD to the next level by placing the sender or the receiver on moving vehicles. After the terrestrial demonstrations we focus on satellite based experiments. Finally, we explore hyper-dimensional QKD, utilising energy−time, polarization and orbital angular momentum (OAM) degrees of freedom.
APA, Harvard, Vancouver, ISO, and other styles
49

Stanley, M., Y. Gui, D. Unnikrishnan, S. R. G. Hall, and I. Fatadin. "Recent Progress in Quantum Key Distribution Network Deployments and Standards." Journal of Physics: Conference Series 2416, no. 1 (2022): 012001. http://dx.doi.org/10.1088/1742-6596/2416/1/012001.

Full text
Abstract:
Abstract Quantum key distribution (QKD) provides in principle unconditional security of key sharing based on the laws of physics only. In the last decade, several experimental and commercial QKD networks have been built and operated worldwide. Demonstrational applications of QKD in financial institutions, government networks, and critical infrastructures such as the power grid have been initially explored. However, large-scale deployment and full-scale commercialization of QKD networks still faces some technological and standardisation challenges. In this paper, recent developments and in-field deployments of QKD networks are reviewed and advancements in QKD standardisation are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Kailu, Jingyang Liu, Huajian Ding, Xingyu Zhou, Chunhui Zhang, and Qin Wang. "Asymmetric Measurement-Device-Independent Quantum Key Distribution through Advantage Distillation." Entropy 25, no. 8 (2023): 1174. http://dx.doi.org/10.3390/e25081174.

Full text
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) completely closes the security loopholes caused by the imperfection of devices at the detection terminal. Commonly, a symmetric MDI-QKD model is widely used in simulations and experiments. This scenario is far from a real quantum network, where the losses of channels connecting each user are quite different. To adapt such a feature, an asymmetric MDI-QKD model is proposed. How to improve the performance of asymmetric MDI-QKD also becomes an important research direction. In this work, an advantage distillation (AD) method is applied to further improve the performance of asymmetric MDI-QKD without changing the original system structure. Simulation results show that the AD method can improve the secret key rate and transmission distance, especially in the highly asymmetric cases. Therefore, this scheme will greatly promote the development of future MDI-QKD networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!