Advances in Quantum Cryptography

@article{Pirandola2019AdvancesIQ,
  title={Advances in Quantum Cryptography},
  author={Stefano Pirandola and Ulrik Lund Andersen and Leonardo Banchi and Mario Berta and Darius Bunandar and Roger Colbeck and D. Englund and Tobias Gehring and Cosmo Lupo and Carlo Ottaviani and Jason L. Pereira and Mohsen Razavi and Jesni Shamsul Shaari and Marco Tomamichel and Vladyslav C. Usenko and Giuseppe Vallone and Paolo Villoresi and Petros Wallden},
  journal={arXiv: Quantum Physics},
  year={2019}
}
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We… 

Experimental Quantum Cryptography With Classical Users

A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state.

Semi-quantum cryptography

A survey of the history and current state of the art in semi-quantum research, including security proof methods and how classical post-processing can be used to counteract users’ inability to perform certain quantum operations, and moving beyond key distribution.

Quantum Oblivious Transfer: A Short Review

This review article surveys the work developed around the concept of oblivious transfer within theoretical quantum cryptography and focuses on some proposed protocols and their security requirements.

Quantum Cryptography: Security for the Post-Quantum world

  • Computer Science, Mathematics
  • 2020
This paper will discuss the current quantum cryptographic techniques both available and in development, such as: quantum key distribution (QKD), quantum networks, delegated quantum computing techniques (BQC and QHE) and quantum random number generators (QRNGS), along with a new classical scheme heralded as a classical QKD-like protocol.

Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review

This paper discusses the process of creating a secret key using quantum mechanics and cryptography methods, explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem.

Quantum Sampling for Optimistic Finite Key Rates in High Dimensional Quantum Cryptography

These sampling-based approaches to entropic uncertainty, and their application to quantum cryptography, hold great potential for deriving proofs of security for quantum cryptographic systems, and the approaches used here may be applicable to an even wider range of scenarios.

Benchmarking of quantum protocols

This paper considers several quantum protocols that enable promising functionalities and services in near-future quantum networks, choosing from both areas of quantum communication and quantum computation as follows: quantum money, W-state based anonymous transmission, verifiable blind quantum computation, and quantum digital signature.

Post-quantum software for distillation of non-orthogonal quantum states through binary frames

The fundamentals of this protocol are described which are represented as an algorithm and the pseudo-code of the most relevant functions of the system is shown, which demonstrates the transmission control, reconciliation and privacy amplification of the shared secret bits.

Optical designs for realization of a set of schemes for quantum cryptography

A set of optical circuits are provided for the implementation of two single photon and one entangled state based controlled quantum dialogue schemes and subsequently reduced the optical designs to yield simpler designs for realizing other secure quantum communication tasks.

A semi-quantum extended B92 protocol and its analysis

A new SQKD protocol based on an Extended B92 protocol which is able to counter certain practical attacks is presented, and may see broad application to other limited-resource (S)QKD protocols.
...