Refining Quantum Cryptography

@article{Hughes2011RefiningQC,
  title={Refining Quantum Cryptography},
  author={Richard J. Hughes and Jane E. Nordholt},
  journal={Science},
  year={2011},
  volume={333},
  pages={1584 - 1586}
}
Recent hacking efforts on quantum cryptography systems have resulted in new approaches for more secure communication networks. With its promise of security rooted in the laws of physics, quantum cryptography has seen tremendous growth as a worldwide research activity and the emergence of start-up commercial ventures since its invention 27 years ago. But in 2010, quantum hacking results (1, 2) appeared to call into question the validity of the entire endeavor. Instead, the ensuing vigorous… 

Quantum Flows for Secret Key Distribution

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

Quantum Flows for Secret Key Distribution Quantum Flows for Secret Key Distribution

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

Experimental realization of three quantum key distribution protocols

Experimental verification of the BB84 protocol using three bases and experimental implementation of the B92 protocol, which was introduced by Charles Bennett in the year 1992, are performed.

9 Quantum Cryptography

Information protection has been an important part of human life from ancient time. In computer society, information security becomes more and more important for humanity and new technologies are

Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

The negative acknowledgment state quantum key distribution protocol is proposed as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates attack without requiring additional optical components different from the B B 84 protocol because the system can be implemented as a high software module.

Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation

The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols.

Quantum Search Algorithms for Wireless Communications

This contribution discusses the basics of quantum computing using linear algebra, before presenting the operation of the major quantum algorithms, which have been proposed in the literature for improving wireless communications systems, and investigates a number of optimization problems encountered both in the physical and network layer of wireless communications.

Interactive learning tutorial on quantum key distribution

The development and in-class evaluation of a Quantum Interactive Learning Tutorial (QuILT) on quantum key distribution are described and it is suggested that the validated QuILT is helpful in improving students' understanding of relevant concepts.

Developing a Control System for Quantum Information Processing with Trapped Ions

A computer-based automated control system is proposed, the core of which, the pulse sequencer, is also discussed in detail, and a simple background of quantum computation and trapped-ion system is provided.

References

SHOWING 1-8 OF 8 REFERENCES

Field test of quantum key distribution in the Tokyo QKD Network.

Two GHz-clocked QKD links enable the world-first secure TV conferencing over a distance of 45km to be demonstrated and detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.

Device-independent quantum key distribution secure against collective attacks

This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.

Hacking commercial quantum cryptography systems by tailored bright illumination

By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists in Europe have shown that it is possible to tracelessly steal the

Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

This paper performs a proof-of-principle experiment to demonstrate a technically feasible 'intercept- and-resend' attack that exploits such a security loophole in a commercial 'plug & play' QKD system.

Field test of wavelength-saving quantum key distribution network.

A wavelength-saving topology of a quantum key distribution (QKD) network based on passive optical elements is proposed, and the field test of this network on commercial telecom optical fiber at the frequency of 20 MHz is reported.

Metropolitan all-pass and inter-city quantum communication network.

Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km.

Space science. Chinese Academy takes space under its wing.

The bevy of missions marks a turning point for Chinese space science, a poor stepchild under the China National Space Administration that has found in CAS a new parent keen to boost its development.

Experiment plan for a small optical transponder onboard a 50 kg-class small satellite

50kg-class satellites can reduce production cost and time compared to larger satellites. On the other hand, the communication capacity in radio frequency for 50 kg-class satellites is limited,