|
|
|
Georgios M. Nikolopoulos and Marc Fischlin
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used...
ver más
|
|
|
|
|
|
|
Nicolas Fabre
We present a linear optical protocol for teleporting and correcting both temporal and frequency errors in two time?frequency qubit states. The first state is the frequency (or time-of-arrival) cat qubit, which is a single photon in a superposition of two...
ver más
|
|
|
|
|
|
|
Marin Vidakovic and Kruno Milicevic
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals...
ver más
|
|
|
|
|
|
|
Nathan K. Long, Robert Malaney and Kenneth J. Grant
Continuous-variable quantum key distribution (CV-QKD) shows potential for the rapid development of an information-theoretic secure global communication network; however, the complexities of CV-QKD implementation remain a restrictive factor. Machine learn...
ver más
|
|
|
|
|
|
|
Kybeom Kwon, Seunghyun Min, Jongbum Kim and Kwangwon Lee
The space mission analysis and design process defines a space system at the system level to accomplish space mission objectives. Although the traditional process is well established and comprehensive through several years of experience, we propose a nove...
ver más
|
|
|
|
|
|
|
Ming Yang, Haoliang Chang, Jinhuan Chen and Xinyu Zhu
A photodetector is a type of optoelectronic device with excellent photoelectric conversion abilities, which has especially important applications in many fields such as optical communication, image sensing, aerospace/environmental detection, and military...
ver más
|
|
|
|
|
|
|
Phillip Kerger, David E. Bernal Neira, Zoe Gonzalez Izquierdo and Eleanor G. Rieffel
We present two algorithms in the quantum CONGEST-CLIQUE model of distributed computation that succeed with high probability: one for producing an approximately optimal Steiner tree, and one for producing an exact directed minimum spanning tree, each of w...
ver más
|
|
|
|
|
|
|
Mohd Hirzi Adnan, Zuriati Ahmad Zukarnain and Nur Ziadah Harun
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this...
ver más
|
|
|
|
|
|
|
Yuichi Hirota and Masaki Owari
Multicasting of quantum states is an essential feature of quantum internet. Since the noncloning theorem prohibits perfect cloning of an unknown quantum state, an appropriate protocol may depend on the purpose of the multicast. In this paper, we treat th...
ver más
|
|
|
|
|
|
|
Anish Saini, Athanasios Tsokanos and Raimund Kirner
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic alg...
ver más
|
|
|
|