scholarly journals Ultrabroadband Entangled Photons on a Nanophotonic Chip

2021 ◽  
Vol 127 (18) ◽  
Author(s):  
Usman A. Javid ◽  
Jingwei Ling ◽  
Jeremy Staffa ◽  
Mingxiao Li ◽  
Yang He ◽  
...  
Keyword(s):  
2021 ◽  
Vol 118 (10) ◽  
pp. 100502
Author(s):  
Christian Schimpf ◽  
Marcus Reindl ◽  
Francesco Basso Basset ◽  
Klaus D. Jöns ◽  
Rinaldo Trotta ◽  
...  

Author(s):  
E. Saglamyurek ◽  
N. Sinclair ◽  
J. Jin ◽  
J. A. Slater ◽  
D. Oblak ◽  
...  

2016 ◽  
Vol 7 (1) ◽  
Author(s):  
Yan Chen ◽  
Jiaxiang Zhang ◽  
Michael Zopf ◽  
Kyubong Jung ◽  
Yang Zhang ◽  
...  

2008 ◽  
Vol 16 (13) ◽  
pp. 9701 ◽  
Author(s):  
S. Sauge ◽  
M. Swillo ◽  
M. Tengner ◽  
A. Karlsson

2016 ◽  
Vol 14 (02) ◽  
pp. 1630002
Author(s):  
Monika Jacak ◽  
Janusz Jacak ◽  
Piotr Jóźwiak ◽  
Ireneusz Jóźwiak

The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.


2000 ◽  
Vol 62 (5) ◽  
Author(s):  
Reinhard Erdmann ◽  
David Branning ◽  
Warren Grice ◽  
I. A. Walmsley

2005 ◽  
Vol 5 (3) ◽  
pp. 181-186
Author(s):  
Th. Beth ◽  
J. Muller-Quade ◽  
R. Steinwandt

Recently, a quantum key exchange protocol has been described\cite{PFLM04}, which served as basis for securing an actual bank transaction by means of quantum cryptography \cite{ZVS04}. The authentication scheme used to this aim has been proposed by Peev et al. \cite{PML04}. Here we show, that this authentication is insecure in the sense that an attacker can provoke a situation where initiator and responder of a key exchange end up with different keys. Moreover, it may happen that an attacker can decrypt a part of the plaintext protected with the derived encryption key.


Sign in / Sign up

Export Citation Format

Share Document