We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,956 results
  1. Security of quantum key distribution with virtual mutually unbiased bases

    In a perfect quantum key distribution (QKD) protocol, quantum states should be prepared and measured with mutually unbiased bases (MUBs). However, in...

    Hong-Wei Li, Chen-Peng Hao, ... Qing-Yu Cai in Science China Physics, Mechanics & Astronomy
    Article 13 June 2024
  2. Optical communication security transmission based on blockchain

    Information leakage, which damages the transmission medium in optical communication systems, is becoming increasingly serious. The existing optical...

    Jianghong Yan, Yu Zhang, ... Chuanqi Li in Optoelectronics Letters
    Article 30 April 2022
  3. Optimal quantum key distribution networks: capacitance versus security

    The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure...

    Lorenzo Cirigliano, Valentina Brosco, ... Laura Pilozzi in npj Quantum Information
    Article Open access 29 April 2024
  4. Verifying the security of a continuous variable quantum communication protocol via quantum metrology

    Quantum mechanics offers the possibility of unconditionally secure communication between multiple remote parties. Security proofs for such protocols...

    Lorcán O. Conlon, Biveen Shajilal, ... Syed M. Assad in npj Quantum Information
    Article Open access 04 April 2024
  5. A Semi-Quantum Private Comparison with High-Level Security Third Party

    Based on three-particle pure states, a new anonymous semi-quantum privacy comparison is proposed to deal with the threat of quantum computing power...

    Jian Li, Zhuo Wang, ... Fanting Che in International Journal of Theoretical Physics
    Article 29 August 2023
  6. Composable end-to-end security of Gaussian quantum networks with untrusted relays

    Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated...

    Masoud Ghalaii, Panagiotis Papanastasiou, Stefano Pirandola in npj Quantum Information
    Article Open access 08 September 2022
  7. Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement

    Recently, Tian et al. (Quantum Inf. Process., 20(6), 217(2021)) proposed an efficient semi-quantum secret-sharing protocol of specific bits. In their...

    Fan He, **angjun **n, ... Fagen Li in Quantum Information Processing
    Article 07 February 2024
  8. Research on key technologies of data security and privacy protection in Internet of Things group intelligence

    With the increasing scale and complexity of IoT swarm intelligence applications, data security and privacy protection have become important factors...

    Yadong Liu, Yahui Hua, Qingrong Chen in Optical and Quantum Electronics
    Article 13 December 2023
  9. Performance analysis of physical-layer security in mid-infrared FSO communication system

    Based on the eavesdrop** model of non-line-of-sight (NLOS) scattering channel in mid-infrared (MIR) free-space optical (FSO) communication system,...

    Rui**g Zhong, Jianhua Ji, ... Yufeng Song in Optical and Quantum Electronics
    Article 27 January 2024
  10. Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios

    To enhance the security of image data, this paper proposes a quantum-classical hybrid image encryption scheme based on parameterized pixel ratios....

    Lin Zeng, Yan Chang, ... Lili Yan in Quantum Information Processing
    Article 24 June 2024
  11. A probabilistic model of quantum states for classical data security

    The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of...

    Muhammad Waseem Hafiz, Seong Oun Hwang in Frontiers of Physics
    Article 24 May 2023
  12. On the security of image cryptosystems using DRPE based on scrambling and diffusion

    Double random phase encoding (DRPE) is one of the most classic methods in optical image encryption. Since the linear property of DRPE makes the...

    Ming Li, Mengdie Wang, ... Hai Nan in Optical and Quantum Electronics
    Article 27 December 2023
  13. Security Loophole and Improvement of Quantum Private Query Protocol Based on W State

    As an important practical cryptographic protocol, quantum key distribution (QKD)-based quantum private query (QPQ) has gained widespread attention in...

    Xue Zhang, Sujuan Qin, ... Qiaoyan Wen in International Journal of Theoretical Physics
    Article 31 July 2023
  14. Finite sampling bandwidth effect on practical security of discretely modulated continuous-variable quantum key distribution

    Finite sampling bandwidth of analog-to-digital converter (ADC) has an effect on performance of continuous-variable quantum key distribution (CVQKD)....

    Junkai Hu, Yijun Wang, ... Ying Guo in Quantum Information Processing
    Article 21 December 2022
  15. Impact of transmitter imbalances on the security of continuous variables quantum key distribution

    Continuous-variable quantum key distribution (CV-QKD) provides a theoretical unconditionally secure solution to distribute symmetric keys among users...

    Daniel Pereira, Margarida Almeida, ... Nuno A. Silva in EPJ Quantum Technology
    Article Open access 14 June 2023
  16. AI drive: quantum-computational DRL framework for EHV navigational efficiency and security augmentation

    The Q-learning approach, within deep reinforcement learning (DRL) methodology, is beneficial in multifarious tasks, one of them including enhancement...

    Ishan Shivansh Bangroo, Ravi Kumar in Optical and Quantum Electronics
    Article 30 January 2024
  17. Simple proof of security of the multiparty prepare and measure QKD

    The majority of research to date has concentrated on the Quantum Key Distribution (QKD) between two parties. In general, the QKD protocols proposed...

    Article 15 October 2022
  18. Resource allocation with fuzzy logic based network optimization and security analysis in optical communication network

    Modern optical transport networks are extremely complicated systems that make managing and distributing management information accurate and...

    Hannah Jessie Rani, Rupal Gupta, ... Kodukula Subrahmanyam in Optical and Quantum Electronics
    Article 10 November 2023
  19. A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security

    Quantum secret sharing (QSS) schemes without entanglement have huge advantages in scalability and are easier to realize as they only require...

    Changbin Lu, Fuyou Miao, ... Yan **ong in Quantum Information Processing
    Article 29 November 2019
  20. Data security using RTL algorithm with chaos synchronization for VLC system

    The latest upcoming technology of visible light communication (VLC) system has become a beneficial part of most of the applications than older...

    V. Prakash, C. T. Manimegalai in Journal of Optics
    Article 10 March 2022
Did you find what you were looking for? Share feedback.