scispace - formally typeset
Search or ask a question
Author

Grégoire Ribordy

Other affiliations: Geneva College
Bio: Grégoire Ribordy is an academic researcher from University of Geneva. The author has contributed to research in topics: Quantum key distribution & Quantum cryptography. The author has an hindex of 16, co-authored 32 publications receiving 9036 citations. Previous affiliations of Grégoire Ribordy include Geneva College.

Papers
More filters
Journal ArticleDOI
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Abstract: Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.

6,949 citations

Journal ArticleDOI
TL;DR: A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
Abstract: We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.

676 citations

Journal ArticleDOI
TL;DR: In this article, the authors presented a fibre-optical quantum key distribution system based on the plug-and-play set-up, which works at 1550nm and is tested under field conditions using aerial and terrestrial cables and performed key exchange over 67 km between Geneva and Lausanne.
Abstract: We present a fibre-optical quantum key distribution system. It works at 1550 nm and is based on the plug&play set-up. We tested the stability under field conditions using aerial and terrestrial cables and performed a key exchange over 67 km between Geneva and Lausanne.

497 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks on quantum key distribution systems, provided that enough additional privacy amplification is applied to the data.
Abstract: General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

471 citations

Journal ArticleDOI
TL;DR: The performance of the SwissQuantum quantum key distribution (QKD) network for more than one-and-a-half years was investigated in this article, from the end of March 2009 to the beginning of January 2011.
Abstract: In this paper, we report on the performance of the SwissQuantum quantum key distribution (QKD) network. The network was installed in the Geneva metropolitan area and ran for more than one-and-a-half years, from the end of March 2009 to the beginning of January 2011. The main goal of this experiment was to test the reliability of the quantum layer over a long period of time in a production environment. A key management layer has been developed to manage the key between the three nodes of the network. This QKD-secure network was utilized by end-users through an application layer.

303 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Abstract: Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.

6,949 citations

Journal ArticleDOI
TL;DR: Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future as mentioned in this paper, which will be useful tools for exploring many-body quantum physics, and may have other useful applications.
Abstract: Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future. Quantum computers with 50-100 qubits may be able to perform tasks which surpass the capabilities of today's classical digital computers, but noise in quantum gates will limit the size of quantum circuits that can be executed reliably. NISQ devices will be useful tools for exploring many-body quantum physics, and may have other useful applications, but the 100-qubit quantum computer will not change the world right away --- we should regard it as a significant step toward the more powerful quantum technologies of the future. Quantum technologists should continue to strive for more accurate quantum gates and, eventually, fully fault-tolerant quantum computing.

3,898 citations

Journal ArticleDOI
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).

2,926 citations

Journal ArticleDOI
TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Abstract: The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits. Quantum computers, quantum cryptography, and quantum teleportation are among the most celebrated ideas that have emerged from this new field. It was realized later on that using continuous-variable quantum information carriers, instead of qubits, constitutes an extremely powerful alternative approach to quantum information processing. This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements. Interestingly, such a restriction to the Gaussian realm comes with various benefits, since on the theoretical side, simple analytical tools are available and, on the experimental side, optical components effecting Gaussian processes are readily available in the laboratory. Yet, Gaussian quantum information processing opens the way to a wide variety of tasks and applications, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination. This review reports on the state of the art in this field, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments.

2,781 citations

Journal ArticleDOI
TL;DR: The first quantum technology that harnesses quantum mechanical effects for its core operation has arrived in the form of commercially available quantum key distribution systems as mentioned in this paper, which achieves enhanced security by encoding information in photons such that an eavesdropper in the system can be detected.
Abstract: The first quantum technology that harnesses quantum mechanical effects for its core operation has arrived in the form of commercially available quantum key distribution systems. This technology achieves enhanced security by encoding information in photons such that an eavesdropper in the system can be detected. Anticipated future quantum technologies include large-scale secure networks, enhanced measurement and lithography, and quantum information processors, which promise exponentially greater computational power for particular tasks. Photonics is destined to have a central role in such technologies owing to the high-speed transmission and outstanding low-noise properties of photons. These technologies may use single photons, quantum states of bright laser beams or both, and will undoubtedly apply and drive state-of-the-art developments in photonics.

1,889 citations