quantum secure communication
Recently Published Documents


TOTAL DOCUMENTS

68
(FIVE YEARS 17)

H-INDEX

11
(FIVE YEARS 2)

Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7904
Author(s):  
David R. Gozzard ◽  
Shane Walsh ◽  
Till Weinhold

Satellite-mediated quantum key distribution (QKD) is set to become a critical technology for quantum-secure communication over long distances. While satellite QKD cannot be effectively eavesdropped, we show it can be disrupted (or ‘jammed’) with relatively simple and readily available equipment. We developed an atmospheric attenuation and satellite optical scattering model to estimate the rate of excess noise photons that can be injected into a satellite QKD channel by an off-axis laser, and calculated the effect this added noise has on the quantum bit error rate. We show that a ground-based laser on the order of 1 kW can significantly disrupt modern satellite QKD systems due to photons scattering off the satellite being detected by the QKD receiver on the ground. This class of laser can be purchased commercially, meaning such a method of disruption could be a serious threat to effectively securing high-value communications via satellite QKD in the future. We also discuss these results in relation to likely future developments in satellite-mediated QKD systems, and countermeasures that can be taken against this, and related methods, of disruption.


2021 ◽  
Author(s):  
Taofiq K. Paraïso ◽  
Thomas Roger ◽  
Davide G. Marangon ◽  
Innocenzo De Marco ◽  
Mirko Sanzaro ◽  
...  

2021 ◽  
pp. 2150343
Author(s):  
Xiao-Jun Wen ◽  
Yong-Zhi Chen ◽  
Xin-Can Fan ◽  
Zheng-Zhong Yi ◽  
Zoe L. Jiang ◽  
...  

Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure communication. In classical cryptographic theory sense, the security of this system is unconditional since it has nothing to do with the attackers’ computing power and computing resources.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Michał Lipka ◽  
Mateusz Mazelanik ◽  
Adam Leszczyński ◽  
Wojciech Wasilewski ◽  
Michał Parniak

AbstractHigh-rate generation of hybrid photon-matter entanglement remains a fundamental building block of quantum network architectures enabling protocols such as quantum secure communication or quantum distributed computing. While a tremendous effort has been made to overcome technological constraints limiting the efficiency and coherence times of current systems, an important complementary approach is to employ parallel and multiplexed architectures. Here we follow this approach experimentally demonstrating the generation of bipartite polarization-entangled photonic states across more than 500 modes, with a programmable delay for the second photon enabled by qubit storage in a wavevector-multiplexed cold-atomic quantum memory. We demonstrate Clauser, Horne, Shimony, Holt inequality violation by over 3 standard deviations, lasting for at least 45 μs storage time for half of the modes. The ability to shape hybrid entanglement between the polarization and wavevector degrees of freedom provides not only multiplexing capabilities but also brings prospects for novel protocols.


Entropy ◽  
2020 ◽  
Vol 22 (10) ◽  
pp. 1152
Author(s):  
Xin Sun ◽  
Piotr Kulicki ◽  
Mirek Sopek

In this paper, we propose a protocol of quantum communication to achieve Byzantine agreement among multiple parties. Our protocol’s striking feature compared to the existing protocols is that we do not use entanglement to achieve the agreement. The role played by entangled states in other protocols is replaced in our protocol by a group of semi-honest list distributors. Such a replacement makes the implementation of our protocol more feasible. Moreover, our protocol is efficient in the sense that it achieves agreement in only three rounds which is a significant improvement with respect to the alternative agreement protocol not using entanglement. In the first round, a list of numbers that satisfies some special properties is distributed to every participant by list distributors via quantum secure communication. Then, in the second and third rounds, those participants exchange some information to reach an agreement.


Author(s):  
M. Suhail Zubairy

Cryptography is a method of secure communication between two or more parties. The crucial step is exchanging a key in a secure manner. There are, however, two problems with conventional cryptography. First the sender and the receiver should exchange the key through highly reliable and secure channels. The second problem is that a clever eavesdropper can, by a careful analysis of the sent information, reconstruct the key. In this chapter, schemes to overcome these problems are presented. First a scheme for exchanging a key over public channels, the so-called RSA algorithm, is discussed. Then the protocols for the quantum key distribution (QKD), the Bennett–Brassard-84 (BB-84) and Bennett-92(B-92) protocols, are then presented. The QKD protocols are exclusively derived using Bohr’s principle of complementarity. An application of these ideas to the design of secure quantum money is discussed.


Sign in / Sign up

Export Citation Format

Share Document