scispace - formally typeset
Journal ArticleDOI

Quantum key distribution technologies

Reads0
Chats0
TLDR
This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocol.
Abstract
Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on quantum cryptography (QC), which offers unconditionally secure communication based on quantum mechanics. This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocol

read more

Citations
More filters
Journal ArticleDOI

Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts

TL;DR: 6G with additional technical requirements beyond those of 5G will enable faster and further communications to the extent that the boundary between physical and cyber worlds disappears.
Journal ArticleDOI

Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future

TL;DR: A novel QC-assisted and QML-based framework for 6G communication networks is proposed while articulating its challenges and potential enabling technologies at the network infrastructure, network edge, air interface, and user end.
Journal ArticleDOI

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

TL;DR: It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding, just like a dense-coding communication between Eve and Alice.
Proceedings ArticleDOI

Differential phase-shift quantum key distribution

TL;DR: The highest key rate and the longest distance have been achieved with the DPS-QKD protocol, and some modified schemes are presented, including that utilizing quantum entanglement, that using decoy pulses, and that using macroscopic coherent light.
Journal Article

Plug and Play Systems for Quantum Cryptography

TL;DR: To compensate for all polarization fluctuations in the transmitting fiber by using Faraday mirror, a plug-and-play system based on faraday mirror for quantum cryptography is introduced, phase-encoding analysis in brief for plug- and play system is implemented as discussed by the authors, interfering pulses follow exactly the same spatial path, ensuring very high stability and selfcompensating
References
More filters
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI

Quantum Cryptography

TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Journal ArticleDOI

Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication

TL;DR: This work presents a scheme of a quantum repeater that connects a string of (imperfect) entangled pairs of particles by using a novel nested purification protocol, thereby creating a single distant pair of high fidelity.
Journal ArticleDOI

Quantum cryptography using any two nonorthogonal states

TL;DR: It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.