Academic literature on the topic 'Secret key rate (SKR)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret key rate (SKR).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secret key rate (SKR)"

1

Harun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, Idawaty Ahmad, and Majed F. Khodr. "MQC-MB: Multiphoton Quantum Communication Using Multiple-Beam Concept in Free Space Optical Channel." Symmetry 13, no. 1 (2020): 66. http://dx.doi.org/10.3390/sym13010066.

Full text
Abstract:
Multiphoton Quantum Key Distribution (QKD) has recently been proposed to exchange the secret keys using the rotational of polarization over a multi-stage protocol. It has the ability to outperform the weaknesses of a single photon QKD by improving the generation of key rate and distance range. This paper investigates the theoretical aspects of multiphoton QKD protocol’s performance over free space optic (FSO) networks. The most common setup for quantum communication is the single-beam approach. However, the single-beam setup has limitations in terms of high geometrical loss. In this paper, the symmetry multiple-beam for quantum communication which is called as Multiphoton Quantum Communication-Multiple Beam (MQC-MB) is proposed to transmit the multiphoton from the sender to the receiver in order to minimize the impact of geometrical loss that is faced by the single-beam setup. The analysis was carried out through mathematical analysis by establishing the FSO quantum model with the effects of atmospheric and geometrical loss as well as considering atmospheric turbulence modeled by log-normal distribution. The design criteria of FSO, such as the transmitter, receiver, beam divergence, and diameter of apertures, are analytically investigated. The numerical results demonstrate that the MQC-MB outperforms the single-beam in terms of reducing channel loss by about 8 dB and works well under strong turbulence channel. Furthermore, the MQC-MB reduces the quantum bit error rate (QBER) and improves the secret key rate (SKR) as compared to the single-beam system even though the distance between the sender and receiver increases.
APA, Harvard, Vancouver, ISO, and other styles
2

James, Ryan, Jeffrey Emenheiser, and James Crutchfield. "Unique Information and Secret Key Agreement." Entropy 21, no. 1 (2018): 12. http://dx.doi.org/10.3390/e21010012.

Full text
Abstract:
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources. For two sources, influence breaks down into the information that both X 0 and X 1 redundantly share with Y, what X 0 uniquely shares with Y, what X 1 uniquely shares with Y, and finally what X 0 and X 1 synergistically share with Y. Unfortunately, considerable disagreement has arisen as to how these four components should be quantified. Drawing from cryptography, we consider the secret key agreement rate as an operational method of quantifying unique information. Secret key agreement rate comes in several forms, depending upon which parties are permitted to communicate. We demonstrate that three of these four forms are inconsistent with the PID. The remaining form implies certain interpretations as to the PID’s meaning—interpretations not present in PID’s definition but that, we argue, need to be explicit. Specifically, the use of a consistent PID quantified using a secret key agreement rate naturally induces a directional interpretation of the PID. We further reveal a surprising connection between third-order connected information, two-way secret key agreement rate, and synergy. We also consider difficulties which arise with a popular PID measure in light of the results here as well as from a maximum entropy viewpoint. We close by reviewing the challenges facing the PID.
APA, Harvard, Vancouver, ISO, and other styles
3

Gyongyosi, Laszlo, and Sandor Imre. "Secret key rate proof of multicarrier continuous-variable quantum key distribution." International Journal of Communication Systems 32, no. 4 (2019): e3865. http://dx.doi.org/10.1002/dac.3865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Pin-Hsun, Carsten R. Janda, Eduard A. Jorswieck, and Rafael F. Schaefer. "Stealthy Secret Key Generation." Entropy 22, no. 6 (2020): 679. http://dx.doi.org/10.3390/e22060679.

Full text
Abstract:
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie’s attention since it has a public discussion, which is observable by Willie. To prevent Willie’s attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
APA, Harvard, Vancouver, ISO, and other styles
5

Lizama-Pérez, Luis Adrián, and José Mauricio López-Romero. "Perfect Reconciliation in Quantum Key Distribution with Order-Two Frames." Symmetry 13, no. 9 (2021): 1672. http://dx.doi.org/10.3390/sym13091672.

Full text
Abstract:
We present an error reconciliation method for Quantum Key Distribution (QKD) that corrects 100% of errors generated in regular binary frames transmitted over a noisy quantum channel regardless of the quantum channel error rate. In a previous investigation, we introduced a novel distillation QKD algorithm whose secret key rate descends linearly with respect to the channel error rate. Now, as the main achievement of this work, we demonstrate an improved algorithm capable of retaining almost all the secret information enclosed in the regular binary frames. Remarkably, this technique increases quadratically the secret key rate as a function of the double matching detection events and doubly quadratically in the number of the quantum pulses. Furthermore, this reconciliation method opens up the opportunity to use less attenuated quantum pulses, would allow greater QKD distances at drastically increased secret key rate. Since our method can be implemented as a software update, we hope that quantum key distribution technology would be fast deployed over global data networks in the quantum era.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Kan, and Bala Natarajan. "MIMO-Based Secret Key Generation Strategies." International Journal of Mobile Computing and Multimedia Communications 6, no. 3 (2014): 22–55. http://dx.doi.org/10.4018/ijmcmc.2014070102.

Full text
Abstract:
Over the last decade, physical layer secret key generation (PHY-SKG) techniques that exploit reciprocity of wireless channels have attracted considerable interest among researchers in the field of wireless communication. Compared to traditional cryptographic methods, PHY-SKG techniques offer the following advantages: a computationally bounded adversary does not need to be assumed; PHY-SKG avoids the requirement of key management, and secret keys can be dynamically replenished. Additionally, PHY-SKG can enhance existing security schemes because it operates independently of higher layer security schemes. However, a key drawback of PHY-SKG is low secret key generation rate (SKGR), a critical performance metric. Therefore, the role of advanced network technologies (e.g., multiple input multiple output (MIMO) and cooperative MIMO) must be explored to enhance SKGR. This paper describes how MIMO and cooperative MIMO techniques can enhance SKGR.
APA, Harvard, Vancouver, ISO, and other styles
7

Jo, Yonggi, Hee Park, Seung-Woo Lee, and Wonmin Son. "Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding." Entropy 21, no. 1 (2019): 80. http://dx.doi.org/10.3390/e21010080.

Full text
Abstract:
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode secret key information. Its practical implementation consists of optical elements that are within the reach of current technologies such as a multiport interferometer. We show that the proposed feasible protocol has improved the secret key rate with much sophistication compared to the previous 2-dimensional protocol known as the detector-device-independent QKD.
APA, Harvard, Vancouver, ISO, and other styles
8

Kleis, Sebastian, and Christian G. Schaeffer. "Improving the Secret Key Rate of Coherent Quantum Key Distribution With Bayesian Inference." Journal of Lightwave Technology 37, no. 3 (2019): 722–28. http://dx.doi.org/10.1109/jlt.2018.2877823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Qiongying, Shuanglin Huang, and Sanjun Liu. "A Method for Detecting Amplitude-Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters." Complexity 2021 (May 3, 2021): 1–11. http://dx.doi.org/10.1155/2021/9951742.

Full text
Abstract:
Aiming at the problems of poor adaptability and low secret key generation rate of secret key generation scheme based on single characteristic parameter of wireless channel, a secret key generation method based on joint characteristic parameters of amplitude and phase of wireless channel is proposed. This method is based on the single-eavesdropping wireless fading channel model; the joint characteristic model of amplitude and phase of wireless fading channel is established; it detects and extracts the joint characteristic parameters of amplitude and phase of channel, and then the proposed characteristics are quantified by using the equal probability joint quantization strategy of amplitude and phase to generate the secret key random parameters. In this paper, the amplitude and phase joint feature parameter detection method of wireless channel can not only improve the generation rate of random secret key parameters but also make the eavesdropping party’s eavesdropping error rate closer to 0.5. The test results show that the proposed scheme can significantly improve the rate, reliability, and security of generating key random parameters.
APA, Harvard, Vancouver, ISO, and other styles
10

Toyran, Metin, Mustafa Toyran, and Sitki Ozturk. "Optimized CASCADE protocol for efficient information reconciliation." Quantum Information and Computation 18, no. 7&8 (2018): 553–78. http://dx.doi.org/10.26421/qic18.7-8-2.

Full text
Abstract:
CASCADE protocol is an error detection and correction (EDC) method proposed firstly for use in quantum key distribution (QKD) systems. It is used to detect and correct all the errors in keys transmitted over a noisy quantum channel. This is done by sending some redundant information about the key to receiver as usual. However, just as differently, this extra information is sent over another noiseless classical channel after the quantum transmission is completely finished. Briefly, all the errors in noisy quantum communication are detected and corrected by a later noiseless classical communication using CASCADE protocol. In QKD literature, this EDC process is also called as information reconciliation (IR) or secret key reconciliation (SKR). For an IR protocol in QKD, one of the main performance measures is efficiency which depends on the amount of redundant information sent to make EDC possible. Since this extra information is transmitted over public channels, everyone can get it easily. Because this can damage the secrecy of keys that must be kept secret from third parties, more efficient, that is revealing less information about keys, IR methods are needed. In this paper, we present more efficient implementations of CASCADE protocol, using some inherent information already available in the protocol, exactly known bits and already known parities. This information is used in error detection and correction steps of the protocol to decrease the redundancy in redundant information. Our experiments have shown that the resulting protocols have higher efficiency than both all the previous CASCADE versions and several other more recently proposed IR methods.
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography