We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 165 results
  1. Composable end-to-end security of Gaussian quantum networks with untrusted relays

    Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated...

    Masoud Ghalaii, Panagiotis Papanastasiou, Stefano Pirandola in npj Quantum Information
    Article Open access 08 September 2022
  2. Quantum Key Distribution with Untrusted Detectors Accessible to an Eavesdropper

    A simple fundamental modification of quantum key distribution protocols has been proposed: it is not required to protect the results of avalanche...

    K. A. Balygin, S. P. Kulik, S. N. Molotkov in JETP Letters
    Article 01 July 2022
  3. Entanglement-based quantum key distribution with untrusted third party

    In quantum key distribution, it is important to ensure the secure key rate and the distribution distance. To increasing transmission distance, we...

    Chang-Yue Zhang, Zhu-Jun Zheng in Quantum Information Processing
    Article 16 April 2021
  4. Enhancing quantum cryptography with quantum dot single-photon sources

    Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means....

    Mathieu Bozzio, Michal Vyvlecka, ... Philip Walther in npj Quantum Information
    Article Open access 08 September 2022
  5. Improve the performance of reference-frame-independent measurement-device-independent quantum key distribution with heralded single-photon sources

    The performance degradation of reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) protocol caused by...

    Ling Zhou, Zhenhua Li, ... Haiqiang Ma in The European Physical Journal D
    Article 12 August 2023
  6. Star network quantum steering

    The topic of network steering in the independent-resource line network with intermediate parties being trusted and end parties being untrusted is...

    Huijie Zhang, Shuyuan Yang, Kan He in Quantum Information Processing
    Article 17 July 2023
  7. Unbounded randomness from uncharacterized sources

    Randomness is a central feature of quantum mechanics and an invaluable resource for both classical and quantum technologies. Commonly, in...

    Marco Avesani, Hamid Tebyanian, ... Giuseppe Vallone in Communications Physics
    Article Open access 05 November 2022
  8. Practical anonymous entanglement with noisy measurement

    Anonymous entanglement refers to the construction of entangled channel between two parties among the quantum network, while kee** the identities of...

    Yukun Wang, **nhui Li, ... Kejia Zhang in Quantum Information Processing
    Article 19 January 2022
  9. Semi-device-independent quantum random number generator with a broadband squeezed state of light

    Random numbers are a basic ingredient of simulation algorithms and cryptography, and play a significant part in computer simulation and information...

    Jialin Cheng, Shaocong Liang, ... Kunchi Peng in npj Quantum Information
    Article Open access 01 February 2024
  10. Qubit and bit-based quantum hybrid secret key generation

    For the generation of a hybrid secret key, hardly any quantum algorithms integrating computed qubits and decrypted bits have yet been developed....

    Shyam R. Sihare in The European Physical Journal D
    Article 21 November 2022
  11. Security analysis and improvement of source independent quantum random number generators with imperfect devices

    A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and...

    **ng Lin, Shuang Wang, ... Zheng-Fu Han in npj Quantum Information
    Article Open access 10 December 2020
  12. Plug-and-play sending-or-not-sending twin-field quantum key distribution

    Twin-field quantum key distribution (TF-QKD) is a new extraordinary QKD protocol, which can overcome the fundamental rate-distance limit without...

    Ke Xue, Shengmei Zhao, ... Rui Xu in Quantum Information Processing
    Article 27 September 2021
  13. Quantum Key Distribution in Access Networks

    This chapter presents a literature survey of data security in optical fiber networks. The evolution of data security in optical fibers starts from...
    Living reference work entry 2023
  14. Detecting and embedding high-dimensional genuine multipartite entanglement states

    Entanglement of high-dimensional multipartite systems plays an important role both in quantum foundation and applications of quantum physics....

    Yan-Han Yang, Xue Yang, Ming-**ng Luo in Quantum Information Processing
    Article 01 November 2022
  15. Measurement-device-independent quantum key distribution with uncharacterized coherent sources

    Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close all possible side channel detector attacks. The security of...

    Guo-Dong Kang, Qing-** Zhou, Mao-Fa Fang in Quantum Information Processing
    Article 11 November 2019
  16. Experimental demonstration of multiparty quantum secret sharing and conference key agreement

    Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryption approaches for realizing multi-party secure...

    Shuaishuai Liu, Zhenguo Lu, ... Yongmin Li in npj Quantum Information
    Article Open access 19 September 2023
  17. A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks

    Classical encryption protocols that are currently used to secure the internet and transmission control protocol/internet protocol (TCP/IP) protocols...

    Masoumeh Shirichian, Reza Sabbaghi-Nadooshan, ... Monireh Houshmand in Quantum Information Processing
    Article 01 March 2024
  18. Breaking universal limitations on quantum conference key agreement without quantum memory

    Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires...

    Chen-Long Li, Yao Fu, ... Zeng-Bing Chen in Communications Physics
    Article Open access 29 May 2023
  19. Revealing hidden steering nonlocality in a quantum network

    Abstract

    By combining two objects with no quantum effect one can get an object with quantum effect. Such a phenomenon, often referred to as activation ...

    Kaushiki Mukherjee, Biswajit Paul, Soma Mandal in The European Physical Journal D
    Article 04 August 2022
  20. Applications of single photons to quantum communication and computing

    In the context of quantum technologies, the generation and manipulation of single photons has become a key element for applications such as quantum...

    Christophe Couteau, Stefanie Barz, ... Gregor Weihs in Nature Reviews Physics
    Article 26 May 2023
Did you find what you were looking for? Share feedback.