Search

Your search keyword '"BB84"' showing total 73 results

Search Constraints

Start Over You searched for: Descriptor "BB84" Remove constraint Descriptor: "BB84" Publisher american physical society (aps) Remove constraint Publisher: american physical society (aps)
73 results on '"BB84"'

Search Results

1. Bounding passive light-source side channels in quantum key distribution via Hong-Ou-Mandel interference

2. Bennett-Brassard 1984 quantum key distribution using conjugate homodyne detection

3. Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing model

4. Dissipative dynamics of quantum states in the fiber channel

5. Practical quantum key distribution with geometrically uniform states

6. Proper error bars for self-calibrating quantum tomography

7. Semiquantum key distribution with high quantum noise tolerance

8. Quantum model of decoherence in the polarization domain for the fiber channel

9. Security proof for single-photon round-robin differential-quadrature-phase-shift quantum key distribution

10. Two-time state formalism for quantum eavesdropping

11. Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

12. Extended analysis of the Trojan-horse attack in quantum key distribution

13. Decoy-state quantum key distribution with more than three types of photon intensity pulses

14. Quantum-key-distribution protocol with pseudorandom bases

15. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

16. Numerical assessment and optimization of discrete-variable time-frequency quantum key distribution

17. Key-rate enhancement using qutrit states for quantum key distribution with askew aligned sources

18. Loss-tolerant quantum secure positioning with weak laser sources

19. Security of the differential-quadrature-phase-shift quantum key distribution

20. Comment on 'Device-independent entanglement-based Bennett 1992 protocol'

21. Scheme for realizing passive quantum key distribution with heralded single-photon sources

22. Experimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol

23. Simple implementation of quantum key distribution based on single-photon Bell-state measurement

24. Symmetrically private information retrieval based on blind quantum computing

25. Trustworthiness of detectors in quantum key distribution with untrusted detectors

26. Quantum key distribution with the single-photon-added coherent source

27. Tight asymptotic key rate for the Bennett-Brassard 1984 protocol with local randomization and device imprecisions

28. Temporal steering inequality

29. Estimates for practical quantum cryptography

30. Eavesdropping optimization for quantum cryptography using a positive operator-valued measure

31. Security of quantum cryptography against individual attacks

32. Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps

33. Quantum-key-distribution protocols without sifting that are resistant to photon-number-splitting attacks

34. Effects of preparation and measurement misalignments on the security of the Bennett-Brassard 1984 quantum-key-distribution protocol

35. Measurement-Device-Independent Quantum Key Distribution

36. Fair and optimistic quantum contract signing

37. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution

38. Secure gated detection scheme for quantum cryptography

39. Achieving the physical limits of the bounded-storage model

40. Security proof for cryptographic protocols based only on the monogamy of Bell’s inequality violations

41. Reference-frame-independent quantum key distribution

42. Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing

43. Robust variations of the Bennett-Brassard 1984 protocol against collective noise

44. Semiquantum-key distribution using less than four quantum states

45. Differential-quadrature-phase-shift quantum key distribution

46. Security proof for quantum-key-distribution systems with threshold detectors

47. Comment on 'Quantum Key Distribution in the Holevo Limit'

48. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source

49. Complete physical simulation of the entangling-probe attack on the Bennett-Brassard 1984 protocol

50. Phase-remapping attack in practical quantum-key-distribution systems

Catalog

Books, media, physical & digital resources