ABSTRACT This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger 1. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users
We prove the unconditional security of ``Quantum cryptography protocols robust against photon number...
ABSTRACT: Quantum Key Distribution (QKD) is an automated method for distributing secret keys across ...
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fib...
Quantum cryptography is a well-stated field within quantum applications where quantum information is...
Information security is increasingly important as society migrates to the information age. Classical...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In ord...
We propose a new class of quantum key distribution protocol, that ended up to be robust against phot...
This note presents a method of public key distribution using quantum communication of n photons that...
Every security analysis of quantum-key distribution (QKD) relies on a faithful modeling of the emplo...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mecha...
ABSTRACT-Key distribution is the process of sharing the key between the parties who intend to commun...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
We prove the unconditional security of ``Quantum cryptography protocols robust against photon number...
ABSTRACT: Quantum Key Distribution (QKD) is an automated method for distributing secret keys across ...
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fib...
Quantum cryptography is a well-stated field within quantum applications where quantum information is...
Information security is increasingly important as society migrates to the information age. Classical...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In ord...
We propose a new class of quantum key distribution protocol, that ended up to be robust against phot...
This note presents a method of public key distribution using quantum communication of n photons that...
Every security analysis of quantum-key distribution (QKD) relies on a faithful modeling of the emplo...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mecha...
ABSTRACT-Key distribution is the process of sharing the key between the parties who intend to commun...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
We prove the unconditional security of ``Quantum cryptography protocols robust against photon number...
ABSTRACT: Quantum Key Distribution (QKD) is an automated method for distributing secret keys across ...
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fib...