Quantum key distribution protocols are used in quantum key distribution. The first protocol of that kind was BB84, introduced in 1984. After thatâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2012

2012

Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secretâ€¦Â (More)

Is this relevant?

2010

2010

- Hoi-Kwong Lo
- 2010

Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show thatâ€¦Â (More)

Is this relevant?

2010

2010

Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKDâ€¦Â (More)

Is this relevant?

2009

2009

- Teng-Yun Chen, Jian Ming Wang, +10 authors Jian-Wei Pan
- 2009

We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by usingâ€¦Â (More)

Is this relevant?

2009

2009

- Yuhua Chen, Pramode K. Verma, Subhash C. Kak
- Security and Communication Networks
- 2009

Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers fromâ€¦Â (More)

Is this relevant?

2007

2007

- Shuang Zhao, Hans De Raedt
- 2007

Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve thisâ€¦Â (More)

Is this relevant?

2007

2007

- James Harold Thomas
- ArXiv
- 2007

This paper introduces a variation on Kakâ€™s three-stage quanutm key distribution protocol which allows for defence against the manâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Subhash C. Kak
- ArXiv
- 2005

We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secretâ€¦Â (More)

Is this relevant?

2002

2002

- Daphna G. Enzer, Phillip G Hadley, Richard J. Hughes, Charles G. Peterson, Paul G. Kwiat
- 2002

We have implemented the â€˜six-stateâ€™ quantum cryptography protocol using polarization-entangled photon pairs, in which theâ€¦Â (More)

Is this relevant?

1999

1999

- Chi-Sheng Niu, Robert B. Griffiths
- 1999

We study the mapping which occurs when a single qubit in an arbitrary state interacts with another qubit in a given, fixed stateâ€¦Â (More)

Is this relevant?