Quantum key distribution

Known as: QKD, Photon number splitting, Quantum key distribution network 
Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Quantum-key distribution has been studied as an ultimate method for secure communications, and now it is emerging as a technology… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Institute of Computer Science, The Hebrew University, Jerusalem, Israel Institute of Theoretical Physics and Astrophysics… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The paper reports on the entangled-state quantum cryptography system practical operation. The full key generation protocol was… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the… (More)
Is this relevant?