# Terahertz Quantum Cryptography

@article{Ottaviani2020TerahertzQC, title={Terahertz Quantum Cryptography}, author={Carlo Ottaviani and Matthew J. Woolley and Mikhail Erementchouk and John F. Federici and Pinaki Mazumder and Stefano Pirandola and Christian Weedbrook}, journal={IEEE Journal on Selected Areas in Communications}, year={2020}, volume={38}, pages={483-495} }

A well-known empirical rule for the demand of wireless communication systems is that of Edholm’s law of bandwidth. It states that the demand for bandwidth in wireless short-range communications doubles every 18 months. With the growing demand for bandwidth and the decreasing cell size of wireless systems, terahertz (THz) communication systems are expected to become increasingly important in modern day applications. With this expectation comes the need for protecting users’ privacy and security…

## 17 Citations

Continuous-Variable Quantum Secret Sharing Based on Thermal Terahertz Sources in Inter-Satellite Wireless Links

- Computer ScienceEntropy
- 2021

Results show that a long-distance inter-satellite THz-CVQSS scheme with multiple players is feasible and will provide an effective way for building an inter-Satellite quantum communication network.

Advances in Quantum Cryptography

- Computer Science
- 2019

This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.

Inter-Satellite Quantum Key Distribution at Terahertz Frequencies

- Physics, Computer ScienceICC 2019 - 2019 IEEE International Conference on Communications (ICC)
- 2019

This work demonstrates that THz quantum entanglement distribution and Thz quantum key distribution are viable deployment options in the micro-satellite context and discusses how such deployment opens up the possibility for simpler integration of global quantum and wireless networks.

Indoor channel modeling for continuous variable quantum key distribution in the terahertz band.

- Computer ScienceOptics express
- 2020

An indoor channel model is established to show the feasibility of continuous-variable quantum key distribution in terahertz (THz) band and the ray-tracing based numerical simulations show that the multi-path propagation can degrade the performance of the indoor CVQKD system.

Channel Estimation and Secret Key Rate Analysis of MIMO Terahertz Quantum Key Distribution

- Computer ScienceIEEE Transactions on Communications
- 2022

The secret key rate (SKR) of a multiple-input multiple-output (MIMO) continuous variable quantum key distribution (CVQKD) system operating at terahertz frequencies may degrade significantly as compared to the SKR upper bound that assumes perfect channel state information, particularly at large transmission distances.

FL-QKD based on optical-THz biphotons generated by spontaneous parametric downconversion in inter-satellite wireless communication.

- Computer Science, PhysicsApplied optics
- 2021

Numerical simulations show that THz-FL-QKD is capable of a 50 Mbps SKR at 10 THz frequency in a 200 km inter-satellite wireless link, and it is expected this work will provide an efficient path to build a high-speed global quantum communication network.

Quantum Communications in Future Networks and Services

- Computer ScienceQuantum Reports
- 2020

The paper concludes with the description of a future application scenario, called Quantum Optical Twin, where the above Quantum Optical Communications technologies are exploited to provide services such as: ultra-massive scale communications for connected spaces and ambient intelligence, holographic telepresence, tactile Internet, new paradigms of brain computer interactions, innovative forms of communications.

A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks

- Computer ScienceSecurity and Communication Networks
- 2022

This paper proposes a conditional privacy-preserving authentication scheme based on a quantum key distribution protocol for vehicle-to-infrastructure (V2I) communication that does not require a secret authentication key to be transmitted conventionally and is resistant to quantum attacks.

Channel Modeling of IoT Phantom Networks: Communications in the THz Band

- Computer Science
- 2021

This work characterize and evaluate the feasibility of a single-hop THz band communication between aerially suspended nano-nodes communicating with one another in the THZ band for bridging disjoint Internet of Things (IoT) communication infrastructures.

Phase noise-immune unconditionally secured classical key distribution using doubly coupled Mach-Zehnder interferometer

- Physics
- 2020

Recently, new physics for unconditional security in a classical key distribution (USCKD) in a frame of a double Mach-Zehnder interferometer has been proposed and demonstrated as a proof of principle,…

## References

SHOWING 1-10 OF 157 REFERENCES

High-rate measurement-device-independent quantum cryptography

- Computer Science
- 2015

A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.

Two-way quantum cryptography at different wavelengths

- Computer Science, Physics
- 2014

A two-way quantum communication protocol where Gaussian-modulated thermal states are subject to random Gaussian displacements and finally homodyned is considered, showing how its security threshold is extremely robust with respect to the preparation noise and able to outperform the security thresholds of one-way protocols at any wavelength.

Review of terahertz and subterahertz wireless communications

- Computer Science
- 2010

The goal of this paper is to provide a comprehensive review of wireless sub-THz and THz communications and report on the reported advantages and challenges of using sub-terahertz andTHz waves as a means to transmit data wirelessly.

Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

- Computer ScienceEntropy
- 2015

The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.

Quantum cryptography approaching the classical limit.

- Computer Science, MathematicsPhysical review letters
- 2010

The security of continuous-variable quantum cryptography as the authors approach the classical limit is shown to be incredibly robust against significant amounts of excess preparation noise, and for the first time quantum cryptography at wavelengths considerably longer than optical is considered.

Fundamental limits of repeaterless quantum communications

- Computer ScienceNature communications
- 2017

The fundamental rate-loss tradeoff affecting any protocol of quantum key distribution is determined, which sets the limits of point-to-point quantum communications and provides precise and general benchmarks for quantum repeaters.

Advances in Quantum Cryptography

- Computer Science
- 2019

This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.

General immunity and superadditivity of two-way Gaussian quantum cryptography

- Computer ScienceScientific reports
- 2016

It is proved that two-way Gaussian protocols are immune to coherent attacks, and the general superadditivity of the two- way security thresholds are proven to be higher than the corresponding one-way counterparts in all cases.

Continuous-Variable Quantum Key Distribution using Thermal States

- Computer Science, Physics
- 2012

The security of continuous-variable quantum key distribution using thermal (or noisy) Gaussian resource states is analyzed against collective Gaussian attacks using direct and reverse reconciliation where both protocols use either homodyne or heterodyne detection to improve robustness to channel noise.

Discrete and continuous variables for measurement-device-independent quantum cryptography

- Physics
- 2015

It is shown that the secret key rate of DV MDI QKD with commercially available high-efficiency single-photon detectors (SPDs) and good system alignment is typically rather high and thus highly suitable for not only long-distance communication but also metropolitan networks.