ﻻ يوجد ملخص باللغة العربية
Quantum key distribution(QKD) is an important area in quantum information theory. Nowadays, there are many protocols such as BB84 protocol, Lo-Chaus protocol and GR10 protocol. They usually require legitimated parties have the ability to create particles, using a sifting procedures (BB84, GR10), or must destroy entangled states (Lo-Chau). In this paper, we give a QKD scheme which can recycle entangled states and need not to run sifting procedures. The protocol use teleportation and mutual unbiased bases of qudits. Moreover, The scheme can be modified to add a third party who assumes all the states creating procedures and so the communicated parties need not to create states. This is in fact an entanglement distribution protocol. Also, the protocol can be modified for distributing key over arbitrary long distance. We compare our protocol with the previous protocols and discuss the security of it by corresponding to BB84 protocol.
Quantum key distribution provides secure keys resistant to code-breaking quantum computers. The continuous-variable version of quantum key distribution offers the advantages of higher secret key rates in metropolitan areas, as well as the use of stan
Quantum key distribution (QKD) is one of the most important subjects in quantum information theory. There are two kinds of QKD protocols, prepare-measure protocols and entanglement-based protocols. For long-distance communications in noisy environmen
We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per second over 250km.
Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptio
To realize the practical implementation of device-independent quantum key distribution~(DIQKD), the main difficulty is that its security relies on the detection-loophole-free violation of the Clauser-Horne-Shimony-Holt~(CHSH) inequality, i.e. the CHS