Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,302 papers from all fields of science
Search
Sign In
Create Free Account
List of quantum key distribution protocols
Known as:
Quantum cryptography protocols
, List of quantum cryptography protocols
, Protocol
Expand
Quantum key distribution protocols are used in quantum key distribution. The first protocol of that kind was BB84, introduced in 1984. After that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
BB84
Decoy state
MSZ96
Quantum key distribution
Expand
Broader (1)
Quantum cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol
Mayssaa El Rifai
,
P. Verma
12th IEEE International Conference on Trust…
2013
Corpus ID: 2617079
A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper…
Expand
2013
2013
Authentication in Online Banking Systems through Quantum Cryptography
Anand Sharma
2013
Corpus ID: 18517567
The new information technology is becoming an important factor in the future development of financial services industry, and…
Expand
2012
2012
Оцінка корегуючої здатності завадостійкого коду Файра для реалізації пінг-понг протоколу з парами переплутаних кубітів в квантовому каналі з завадами
Сергей Вадимович Николаенко
,
Евгений Викторович Василиу
2012
Corpus ID: 60547480
The paper develops the simulation model of a ping-pong protocol with pairs of entangled qubits in a noisy quantum channel in…
Expand
2012
2012
Implementation of Secure Quantum Protocol using Multiple Photons for Communication
S. Mandal
,
Gregory Macdonald
,
+7 authors
J. Sluss
arXiv.org
2012
Corpus ID: 17674647
The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud…
Expand
2011
2011
Faked states attack and quantum cryptography protocols
Travis Denny
arXiv.org
2011
Corpus ID: 17815349
Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in…
Expand
2010
2010
Optimal pulse to generate non-classical photon states via photon blockade
A. Majumdar
,
A. Faraon
,
J. Vučković
OPTO
2010
Corpus ID: 8655833
The single photon character of nonclassical states of light that can be generated using photon blockade is analyzed for time…
Expand
2008
2008
Performance of two decoy-state quantum cryptography protocols in earth-satellite links
L. Moli
,
A. Rodriguez
,
G. Seco-Granados
2008
Corpus ID: 119285130
This paper has been withdrawn by the author. It will be published again after submission to a journal.
2007
2007
Quantum Cryptography Protocol Based on Sending Entangled Qubit Pairs
Olli Ahonen
2007
Corpus ID: 118531407
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, describes how two spatially…
Expand
2002
2002
Quantum three-pass cryptography protocol
Li Yang
,
Ling-An Wu
,
Song-hao Liu
SPIE/COS Photonics Asia
2002
Corpus ID: 121488737
We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which…
Expand
2001
2001
A fully efficient secure quantum cryptography protocol
Xiang-bin Wang
2001
Corpus ID: 10208752
The paper has been withdrawn by the author since the protocol is not new. It is just the oldest version of BB84.
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE