Journal ArticleDOI
Quantum key distribution technologies
Reads0
Chats0
TLDR
This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocol.Abstract:
Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on quantum cryptography (QC), which offers unconditionally secure communication based on quantum mechanics. This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocolread more
Citations
More filters
Journal ArticleDOI
Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts
Xiaohu You,Cheng-Xiang Wang,Jie Huang,Xiqi Gao,Zaichen Zhang,Michael Mao Wang,Yongming Huang,Chuan Zhang,Yanxiang Jiang,Jiaheng Wang,Min Zhu,Bin Sheng,Dongming Wang,Zhiwen Pan,Pengcheng Zhu,Yang Yang,Zening Liu,Ping Zhang,Xiaofeng Tao,Shaoqian Li,Zhi Chen,Xinying Ma,Chih-Lin I,Shuangfeng Han,Ke Li,Pan Chengkang,Zhiming Zheng,Lajos Hanzo,Xuemin Shen,Yingjie Jay Guo,Zhiguo Ding,Harald Haas,Wen Tong,Peiying Zhu,Guanghua Yang,Jun Wang,Eric G. Larsson,Hien Quoc Ngo,Wei Hong,Haiming Wang,Debin Hou,Jixin Chen,Zhe Chen,Zhang-Cheng Hao,Geoffrey Ye Li,Rahim Tafazolli,Yue Gao,H. Vincent Poor,Gerhard P. Fettweis,Ying-Chang Liang +49 more
TL;DR: 6G with additional technical requirements beyond those of 5G will enable faster and further communications to the extent that the boundary between physical and cyber worlds disappears.
Journal ArticleDOI
Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future
TL;DR: A novel QC-assisted and QML-based framework for 6G communication networks is proposed while articulating its challenges and potential enabling technologies at the network infrastructure, network edge, air interface, and user end.
Journal ArticleDOI
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
TL;DR: It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding, just like a dense-coding communication between Eve and Alice.
Proceedings ArticleDOI
Differential phase-shift quantum key distribution
TL;DR: The highest key rate and the longest distance have been achieved with the DPS-QKD protocol, and some modified schemes are presented, including that utilizing quantum entanglement, that using decoy pulses, and that using macroscopic coherent light.
Journal Article
Plug and Play Systems for Quantum Cryptography
TL;DR: To compensate for all polarization fluctuations in the transmitting fiber by using Faraday mirror, a plug-and-play system based on faraday mirror for quantum cryptography is introduced, phase-encoding analysis in brief for plug- and play system is implemented as discussed by the authors, interfering pulses follow exactly the same spatial path, ensuring very high stability and selfcompensating
References
More filters
Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI
Quantum Cryptography
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Journal ArticleDOI
Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication
TL;DR: This work presents a scheme of a quantum repeater that connects a string of (imperfect) entangled pairs of particles by using a novel nested purification protocol, thereby creating a single distant pair of high fidelity.
Journal ArticleDOI
Quantum cryptography using any two nonorthogonal states
TL;DR: It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.