Refining Quantum Cryptography

@article{Hughes2011RefiningQC,
  title={Refining Quantum Cryptography},
  author={Richard J. Hughes and Jane E. Nordholt},
  journal={Science},
  year={2011},
  volume={333},
  pages={1584 - 1586}
}
Recent hacking efforts on quantum cryptography systems have resulted in new approaches for more secure communication networks. With its promise of security rooted in the laws of physics, quantum cryptography has seen tremendous growth as a worldwide research activity and the emergence of start-up commercial ventures since its invention 27 years ago. But in 2010, quantum hacking results (1, 2) appeared to call into question the validity of the entire endeavor. Instead, the ensuing vigorous… Expand
Quantum Flows for Secret Key Distribution
TLDR
A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. Expand
Experimental realization of three quantum key distribution protocols
TLDR
Experimental verification of the BB84 protocol using three bases and experimental implementation of the B92 protocol, which was introduced by Charles Bennett in the year 1992, are performed. Expand
9 Quantum Cryptography
Information protection has been an important part of human life from ancient time. In computer society, information security becomes more and more important for humanity and new technologies areExpand
Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
TLDR
The negative acknowledgment state quantum key distribution protocol is proposed as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates attack without requiring additional optical components different from the B B 84 protocol because the system can be implemented as a high software module. Expand
Enhancing Quantum Key Distribution (QKD) to address quantum hacking
Abstract Quantum key distribution (QKD) is intended to produce cryptographic secret keys between two remote parties, usually called Alice and Bob. Even though QKD has been proven to beExpand
Network-Centric Quantum Communications with Application to Critical Infrastructure Protection
TLDR
Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components include: quantum identification; verifiable quantum secret sharing; multi-party authenticated key establishment, including group keying; and single-fiber quantum-secured communications that can be applied as a security retrofit/upgrade to existing optical fiber installations. Expand
Relativistic quantum cryptography
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, theExpand
Quantum Search Algorithms for Wireless Communications
TLDR
This contribution discusses the basics of quantum computing using linear algebra, before presenting the operation of the major quantum algorithms, which have been proposed in the literature for improving wireless communications systems, and investigates a number of optimization problems encountered both in the physical and network layer of wireless communications. Expand
Interactive learning tutorial on quantum key distribution
TLDR
The development and in-class evaluation of a Quantum Interactive Learning Tutorial (QuILT) on quantum key distribution are described and it is suggested that the validated QuILT is helpful in improving students' understanding of relevant concepts. Expand
Developing a Control System for Quantum Information Processing with Trapped Ions
In recent years, classical computers have seen their boundaries, both physical and theoretical. Quantum computer, as a new research field, has been more and more widely explored. The trapped-ionExpand
...
1
2
...

References

SHOWING 1-8 OF 8 REFERENCES
Field test of quantum key distribution in the Tokyo QKD Network.
TLDR
Two GHz-clocked QKD links enable the world-first secure TV conferencing over a distance of 45km to be demonstrated and detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network. Expand
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD followsExpand
Hacking commercial quantum cryptography systems by tailored bright illumination
By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists in Europe have shown that it is possible to tracelessly steal theExpand
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfectionsExpand
Field test of wavelength-saving quantum key distribution network.
TLDR
A wavelength-saving topology of a quantum key distribution (QKD) network based on passive optical elements is proposed, and the field test of this network on commercial telecom optical fiber at the frequency of 20 MHz is reported. Expand
Metropolitan all-pass and inter-city quantum communication network.
TLDR
Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km. Expand
Space science. Chinese Academy takes space under its wing.
  • H. Xin
  • Political Science, Medicine
  • Science
  • 2011
TLDR
The bevy of missions marks a turning point for Chinese space science, a poor stepchild under the China National Space Administration that has found in CAS a new parent keen to boost its development. Expand
Experiment plan for a small optical transponder onboard a 50 kg-class small satellite
50kg-class satellites can reduce production cost and time compared to larger satellites. On the other hand, the communication capacity in radio frequency for 50 kg-class satellites is limited,Expand