|
|
|
Shuai Zhang, Heng Wang, Yan Pan, Yun Shao, Tao Zhang, Wei Huang, Yang Li and Bingjie Xu
Dual-polarization division multiplexing (DPDM) is considered to be a potential method to boost the secure key rate (SKR) of the continuous-variable quantum key distribution (CV-QKD) system. In this article, we propose a pilot alternately assisted local l...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Nathan K. Long, Robert Malaney and Kenneth J. Grant
Continuous-variable quantum key distribution (CV-QKD) shows potential for the rapid development of an information-theoretic secure global communication network; however, the complexities of CV-QKD implementation remain a restrictive factor. Machine learn...
ver más
|
|
|
|
|
|
|
Gabriel M. Carral, Jesús Liñares, Eduardo F. Mateo and Xesús Prieto-Blanco
We analyze autocompensation possibilities in entanglement-based QKD protocols. In particular, we study the seminal BBM92 protocol and find that an autocompensating technique is possible, although with severe limitations. This prompts the introduction of ...
ver más
|
|
|
|
|
|
|
Mohd Hirzi Adnan, Zuriati Ahmad Zukarnain and Nur Ziadah Harun
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this...
ver más
|
|
|
|
|
|
|
Ignazio Pedone and Antonio Lioy
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for Q...
ver más
|
|
|
|
|
|
|
Chun Zhou, Yu Zhou, Yangbin Xu, Yang Wang, Yifei Lu, Musheng Jiang, Xiaoxu Zhang and Wansu Bao
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-dec...
ver más
|
|
|
|
|
|
|
Yaxi Pan, Ling Zhang and Duan Huang
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice?s set-up. With the analysis of back-reflec...
ver más
|
|
|
|
|
|
|
Xinchao Ruan, Hang Zhang, Wei Zhao, Xiaoxue Wang, Xuan Li and Ying Guo
We investigate the optical absorption and scattering properties of four different kinds of seawater as the quantum channel. The models of discrete-modulated continuous-variable quantum key distribution (CV-QKD) in free-space seawater channel are briefly ...
ver más
|
|
|
|
|
|
|
Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Ryan Engle, Colin McLaughlin and Gerald Baumgartner
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show ...
ver más
|
|
|
|