搜索结果: 1-15 共查到“物理学 key”相关记录42条 . 查询时间(0.109 秒)
2018 SPIE An Optical Believe It or Not:Key Lessons Learned V
2018 SPIE Optical Believe It or Not Key Lessons Learned V
2017/11/27
This conference is dedicated to the sharing of key optical lessons learned. Nearly all optical engineers, scientists, researchers, or managers have dealt with the unexpected. Many of these situations ...
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Experimental measurement-device-independent quantum key distribution
measurement-device-independent quantum key distribution
2016/1/23
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and d...
Measurement-device-independent Quantum Key Distribution with Uncharacterized Qubit Sources
Measurement-device-independent Quantum Key Distribution Uncharacterized Qubit Sources
2016/1/23
Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that th...
Entanglement-based quantum key distribution with biased basis choice via free space
Entanglement-based quantum key distribution iased basis choice via free space
2016/1/23
We report a free-space entanglement-based quantum key dis-tribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entan...
Measurement-Device-Independent Quantum Key Distribution over 200 km
Measurement-Device-Independent Quantum Key Distribution
2016/1/22
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon de...
UNIVERSITY PARK, Pa. -- Understanding how atoms "glide" and "climb" on the surface of 2D crystals like tungsten disulphide may pave the way for researchers to develop materials with unusual or unique ...
Uinversity of Illinois at Chicago researchers have discovered a way to create a highly sensitive chemical sensor based on the crystalline flaws in graphene sheets. The imperfections have unique electr...
Comment on "Semiquantum-key distribution using less than four quantum states"
Semiquantum-key distribution quantum states
2010/11/4
Comment on "Semiquantum-key distribution using less than four quantum states".
Min-entropy and quantum key distribution: non-zero key rates for "small" numbers of signals
min-entropy quantum key distribution non-zero key rates
2010/11/8
We calculate an achievable secret key rate for quantum key distribution with a finite number of signals, by evaluating the min-entropy explicitly. The min-entropy can be expressed in terms of the gues...
Continuous variable quantum key distribution in non-Markovian channels
non-Markovian variable quantum
2010/11/8
We address continuous variable quantum key distribution (QKD) in non-Markovian lossy channels and show how the non-Markovian features may be exploited to enhance security and/or to detect the presence...
Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback
Ultimate crack Quantum Physics
2010/11/8
We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute be...
Reply to "Comment on 'Semiquantum-key distribution using less than four quantum states' "
Comment on Semiquantum-key distribution quantum states
2010/11/8
Recently Boyer and Mor pointed out the first conclusion of Lemma 1 in our original paper is not correct, and therefore, the proof of Theorem 5 based on Lemma 1 is wrong. Furthermore, they gave a direc...