Checking noise correlations for safer two-way quantum key distribution
We check for noise correlations between forward and backward paths in two-way quantum key distribution, which leads to reduced potentialities for an eavesdropper since she can only hide herself behind uncorrelated (natural) noise. The security enhancement is evaluated through the ratio of eavesdropp...
| Main Authors: | Shamsul Shaari, Jesni, Lucamarini, Marco, Mancini, Stefano |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Springer
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/34137/ http://irep.iium.edu.my/34137/1/10.1007_s11128-013-0717-3.pdf http://irep.iium.edu.my/34137/4/34137_Checking%20noise%20correlations_SCOPUS.pdf |
Similar Items
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015)
by: Kamaruddin, Suhaili, et al.
Published: (2015)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
Entropic bounds for unitary testers and mutually unbiased unitary bases
by: Shamsul Shaari, Jesni, et al.
Published: (2020)
by: Shamsul Shaari, Jesni, et al.
Published: (2020)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Blind encoding into qudits
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
On mutually unbiased unitary bases in prime-dimensional Hilbert spaces
by: Nasir, Rinie N. M., et al.
Published: (2019)
by: Nasir, Rinie N. M., et al.
Published: (2019)
Mutually unbiased unitary bases
by: Shamsul Shaari, Jesni, et al.
Published: (2016)
by: Shamsul Shaari, Jesni, et al.
Published: (2016)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
Measures and applications of quantum correlations
by: Adesso, Gerardo, et al.
Published: (2016)
by: Adesso, Gerardo, et al.
Published: (2016)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
The effect of mean photon number to the output key rate in quantum key distribution
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Similar Items
-
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014) -
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011) -
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012) -
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)