Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on d...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, desc...
Abstract This work presents quantum key distribution protocols (QKDPs) to safeguard security in larg...
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two ...
<p>Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows t...
Data protection and information security have been the essence of communication in today's digital e...
Data protection and information security have been the essence of communication in today's digital e...
textabstractQuantum cryptography makes use of the quantum-mechanical behavior of nature for the desi...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
Empirical thesis.Includes bibliographical references.1. Introduction -- 2. Preliminaries -- 3. High-...
Nowadays security in communication is increasingly important to the network communication because ma...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, desc...
Abstract This work presents quantum key distribution protocols (QKDPs) to safeguard security in larg...
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two ...
<p>Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows t...
Data protection and information security have been the essence of communication in today's digital e...
Data protection and information security have been the essence of communication in today's digital e...
textabstractQuantum cryptography makes use of the quantum-mechanical behavior of nature for the desi...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
We review a quantum key distribution protocol, recently proposed by us, that makes use of a two-way ...
Empirical thesis.Includes bibliographical references.1. Introduction -- 2. Preliminaries -- 3. High-...
Nowadays security in communication is increasingly important to the network communication because ma...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, desc...