List of quantum key distribution protocols

Known as: Quantum cryptography protocols, List of quantum cryptography protocols, Protocol 
Quantum key distribution protocols are used in quantum key distribution. The first protocol of that kind was BB84, introduced in 1984. After that… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1994-2017
0246819942017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret… (More)
Is this relevant?
2010
2010
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that… (More)
Is this relevant?
2010
2010
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2009
2009
We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using… (More)
  • figure 1
  • table 1
Is this relevant?
2009
2009
Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers from… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret… (More)
  • figure 1
  • figure 2
Is this relevant?
2002
2002
We have implemented the ‘six-state’ quantum cryptography protocol using polarization-entangled photon pairs, in which the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
1999
1999
We study the mapping which occurs when a single qubit in an arbitrary state interacts with another qubit in a given, fixed state… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?