Modulation schemes for frequency coded quantum key distribution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Summary of Implementation Schemes for Quantum Key Distribution

Disclaimer: The opinions expressed in this document are those of the Technology Experts Panel members and are subject to change. They should not to be taken to indicate in any way an official position of U.S. Government sponsors of this research.

متن کامل

Bandwidth-efficient correlative trellis-coded modulation schemes

A novel digital modulation scheme is proposed that allows to increase the data rate compared to uncoded modulation when the out-of-band power is fixed. If the data rate remains unchanged, this corresponds to a bandwidth reduction that is achieved by shaping the signal spectrum by the introduction of correlation in the transmitter. This correlation has to be resolved in the receiver by a maximum...

متن کامل

Performance Evaluation of Trellis-Coded Modulation Schemes

A description of the algorithms to evaluate the main parameters determining the pegormance of a Trellis-Coded Modulation (TCM) scheme is presented. TCM schemes are divided into classes that have an increasing degree of symmetry, so as to properly match the various algorithms to each class. The algorithms are compared in terms of computational complexity and tested on a set of multidimensional P...

متن کامل

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

We consider quantum key distribution implementations in which the receiver’s apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver’s equipment. The attack we pre...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics Letters

سال: 2005

ISSN: 0013-5194

DOI: 10.1049/el:20050466