Quantum Key Distribution (QKD) technology has made significant advancements in recent years, with the development of new protocols and systems aimed at improving security and scalability. The most notable progress has been in the implementation of measurement-device-independent QKD (MDI-QKD), which allows for secure key exchange between two parties without relying on a trusted third-party device.
Quantum networking has emerged as a crucial technology for secure communication in the modern era, leveraging the principles of quantum mechanics to enable unbreakable encryption. The core concept behind quantum networking is the utilization of QKD protocols, which allow two parties to share a secret key over an insecure channel without any physical transport of the key itself.
The integration of QKD into existing communication networks is becoming increasingly feasible, thanks to advancements in quantum computing and the development of more efficient QKD systems. The use of QKD for secure communication between different quantum systems has been proposed and experimentally demonstrated, paving the way for new applications and services that rely on the secure exchange of quantum information.
Quantum Networking Basics Explained
Quantum networking is a rapidly evolving field that combines the principles of quantum mechanics with classical communication networks to enable secure and reliable data transfer over long distances. At its core, quantum networking relies on the phenomenon of quantum entanglement, where two or more particles become correlated in such a way that the state of one particle cannot be described independently of the others (Ekert & Renner, 2009). This property allows for the creation of secure keys between two parties, known as Quantum Key Distribution (QKD), which can be used to encrypt and decrypt messages.
One of the key benefits of quantum networking is its potential to provide unconditional security, meaning that any attempt to eavesdrop on a quantum communication channel would introduce errors detectable by the legitimate users. This is in contrast to classical encryption methods, which rely on computational complexity to remain secure (Shor, 1994). Quantum networks can also be used for distributed quantum computing and simulation, where multiple parties work together to solve complex problems that are beyond the capabilities of a single computer.
Quantum networking protocols, such as QKD and superdense coding, have been extensively studied in recent years. These protocols rely on the principles of quantum mechanics to enable secure communication over long distances (Bennett & Brassard, 1984). For example, QKD uses entangled particles to create a shared secret key between two parties, which can then be used for encryption and decryption. Superdense coding, on the other hand, allows for the transmission of multiple classical bits using only one quantum bit.
The development of practical quantum networking systems is an active area of research, with several groups working on the implementation of QKD and other protocols in various settings (Scarani et al., 2009). These systems often rely on optical fibers or free-space channels to transmit quantum information between nodes. The scalability and reliability of these systems are critical for their practical application.
The integration of quantum networking with classical communication networks is also an area of ongoing research. This involves the development of hybrid protocols that combine the benefits of both worlds, such as QKD-based authentication and encryption (Gisin et al., 2002). As the field continues to evolve, it is likely that we will see the emergence of new quantum networking protocols and applications.
History Of Quantum Key Distribution QKD
Quantum Key Distribution (QKD) has its roots in the early 20th century, when physicist Charles Bennett first proposed the concept of using quantum mechanics to securely distribute cryptographic keys between two parties. This idea was initially met with skepticism by the scientific community, but it laid the foundation for the development of QKD protocols.
The first practical implementation of QKD was achieved by a team led by Gilles Brassard and Claude Crépeau in 1984. They demonstrated the feasibility of using quantum entanglement to encode and decode cryptographic keys between two parties. This work built upon earlier research by Bennett, who had shown that quantum mechanics could be used to create secure communication channels.
In the following years, QKD protocols continued to evolve, with researchers such as Artur Ekert and Peter Shor making significant contributions to the field. The development of QKD was driven by the need for secure communication in various applications, including cryptography and telecommunications. As a result, QKD has become an essential component of quantum networking.
One of the key challenges facing QKD is the issue of noise and errors that can occur during the transmission process. These errors can compromise the security of the cryptographic keys being distributed. To address this challenge, researchers have developed various techniques for mitigating the effects of noise on QKD systems. For example, the use of quantum error correction codes has been shown to improve the reliability of QKD protocols.
The development of QKD has also led to significant advances in our understanding of quantum mechanics and its applications. As a result, QKD is now being explored for use in a wide range of fields, including cryptography, telecommunications, and even finance. The potential benefits of QKD are vast, making it an exciting area of research with far-reaching implications.
The first commercial QKD system was released by ID Quantique in 2004, marking the beginning of the widespread adoption of QKD technology. Since then, numerous companies have developed their own QKD systems, and the market has grown significantly. Today, QKD is used in a variety of applications, including secure communication networks and cryptographic key exchange.
Principles Of Quantum Entanglement Used
Quantum entanglement is a phenomenon in which two or more particles become correlated in such a way that the state of one particle cannot be described independently of the others, even when they are separated by large distances.
This correlation is not limited to the properties of the individual particles but extends to their collective behavior, allowing for the instantaneous transfer of information between them. The concept of entanglement was first introduced by Albert Einstein, Boris Podolsky, and Nathan Rosen in 1935 as a thought experiment to challenge the principles of quantum mechanics (Einstein et al., 1935).
The principles of quantum entanglement used in Quantum Networking and QKD are based on the idea that two or more particles can be created in such a way that their properties become correlated, allowing for the instantaneous transfer of information between them. This correlation is not limited to the properties of the individual particles but extends to their collective behavior.
The EPR paradox, as it came to be known, highlighted the apparent absurdity of quantum mechanics and led to a deeper understanding of the principles underlying entanglement. The concept has since been extensively studied and experimentally verified in various systems, including photons, electrons, and even large-scale mechanical systems (Bell, 1964).
Quantum entanglement is a fundamental aspect of Quantum Networking and QKD, enabling secure communication over long distances by exploiting the correlations between entangled particles. The principles used in these applications are based on the idea that any measurement performed on one particle will instantaneously affect the state of the other, regardless of the distance between them.
The no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state, further emphasizes the unique properties of entangled particles and their potential applications in Quantum Networking and QKD (Wootters & Zurek, 1982).
Secure Communication Needs For QKD
Quantum Key Distribution (QKD) is a method of secure communication that relies on the principles of quantum mechanics to encode, transmit, and decode cryptographic keys between two parties. This process involves the use of entangled particles, which are pairs of particles that are connected in such a way that the state of one particle is instantly affected by the state of the other, regardless of the distance between them.
The secure communication needs for QKD can be broken down into three main components: key generation, key exchange, and key authentication. Key generation involves the creation of a shared secret key between two parties using the principles of quantum mechanics. This process is typically performed over an insecure channel, such as the internet, but with the added security of QKD. The key generated through this process is then used for encrypting and decrypting messages.
Key exchange refers to the process of securely exchanging the generated key between the two parties. This can be achieved through various methods, including the use of quantum entanglement swapping, which allows for the transfer of quantum information from one particle to another without physical transport of the particles themselves. The security of this process relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state.
The key authentication step involves verifying the integrity and authenticity of the generated key. This can be achieved through various methods, including the use of hash functions and digital signatures. The security of this process relies on the hardness of certain mathematical problems, such as the discrete logarithm problem and the factorization problem.
In practice, QKD systems typically involve a combination of these components, with the goal of achieving secure communication over long distances. For example, the Chinese Quantum Experiments at Space Scale (QUESS) satellite has demonstrated the ability to perform QKD over a distance of 1,200 kilometers using entangled photons. Similarly, the European Space Agency’s (ESA) QKD system has been tested over a distance of 300 kilometers.
The security of QKD systems relies on the principles of quantum mechanics and the no-cloning theorem, which makes it impossible to eavesdrop on or manipulate the generated key without being detected. This provides an unconditional guarantee of security, making QKD an attractive solution for secure communication in various applications, including finance, government, and healthcare.
Quantum Cryptography Vs Classical Methods
Quantum Cryptography offers a theoretically unbreakable method for secure communication, leveraging the principles of quantum mechanics to encode and decode messages. This approach is based on the no-cloning theorem, which states that it is impossible to create an identical copy of an arbitrary quantum state without knowing the original (Bennett & Brassard, 1984). In contrast, classical methods rely on public-key cryptography, such as RSA or elliptic curve cryptography, which can be vulnerable to attacks by powerful computers.
Classical encryption methods, like RSA, use large prime numbers and complex mathematical operations to secure data. However, these algorithms are based on the difficulty of factoring large composite numbers, a problem that has been shown to be solvable in polynomial time using quantum computers (Shor, 1994). This means that classical encryption methods can potentially be broken by a sufficiently powerful quantum computer.
Quantum Cryptography, on the other hand, uses the principles of quantum mechanics to encode and decode messages. The most common method is Quantum Key Distribution (QKD), which relies on the phenomenon of quantum entanglement to create an unbreakable key between two parties. QKD has been experimentally demonstrated to be secure against eavesdropping attacks, even when using imperfect quantum channels (Ekert & Renner, 2000).
One of the main advantages of Quantum Cryptography is its ability to detect any attempt at eavesdropping or tampering with the communication channel. This is achieved through the use of quantum key exchange protocols, such as BB84, which can detect even a single photon being measured by an unauthorized party (Bennett & Brassard, 1984). In contrast, classical encryption methods do not have this built-in security feature.
The practical implementation of Quantum Cryptography is still in its early stages, with significant technical challenges to overcome before it can be widely adopted. However, the potential benefits of a theoretically unbreakable method for secure communication are substantial, and ongoing research is focused on developing more efficient and reliable QKD protocols (Scarani et al., 2009).
Advantages Of Quantum Key Distribution
Quantum Key Distribution (QKD) is a method of secure communication that utilizes the principles of quantum mechanics to encode, transmit, and decode cryptographic keys. This process ensures the security of the key exchange by exploiting the no-cloning theorem, which states that it is impossible to create an identical copy of an arbitrary quantum state without knowing its exact properties.
The advantages of QKD lie in its ability to provide unconditional security, meaning that any attempt to eavesdrop on the communication would be detectable and thus preventable. This is achieved through the use of entangled particles, which are used to encode the cryptographic key. Any measurement or interaction with these particles would disturb their state, making it possible to detect the presence of an eavesdropper.
One of the primary benefits of QKD is its resistance to quantum computer-based attacks. As quantum computers become more powerful, they will be able to break many classical encryption algorithms currently in use. However, QKD is not vulnerable to these types of attacks, as it relies on the principles of quantum mechanics rather than computational power.
QKD also offers a high level of security for key exchange, even over long distances. This is particularly important for secure communication networks, where the integrity and confidentiality of data are paramount. The use of QKD can provide an additional layer of security, ensuring that any unauthorized access to the network would be detectable and preventable.
The implementation of QKD in real-world applications has been demonstrated through various experiments and deployments. For example, the Chinese government has implemented a QKD network across the country, connecting major cities and providing secure communication for sensitive information. Similarly, several companies have developed commercial QKD systems for use in secure communication networks.
Limitations And Challenges In QKD Systems
Quantum Key Distribution (QKD) systems have been touted as the most secure method for encrypting data, but they come with their own set of limitations and challenges. One major limitation is the need for a trusted quantum channel between the sender and receiver, which can be difficult to establish in practice (Lo et al., 2005). This requirement makes QKD systems vulnerable to attacks from untrusted parties.
Another challenge facing QKD systems is the issue of key reconciliation, where the sender and receiver must reconcile their respective keys to ensure they are identical. This process can be computationally intensive and may introduce errors into the system (Shor & Preskill, 2000). Furthermore, the security of QKD systems relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state without knowing the original state. However, this theorem has been shown to be vulnerable to certain types of attacks (Brassard et al., 2011).
The practical implementation of QKD systems also poses significant challenges. For instance, the attenuation of photons over long distances can limit the range of QKD systems, making them unsuitable for large-scale applications (Gisin et al., 2002). Additionally, the need for precise control over quantum states and operations can be difficult to achieve in practice, introducing errors into the system.
The security of QKD systems has been extensively studied, but there are still some open questions regarding their practical implementation. For example, the impact of photon loss on the security of QKD systems is not yet fully understood (Scarani et al., 2004). Furthermore, the development of more efficient and reliable QKD protocols is an active area of research.
The limitations and challenges facing QKD systems highlight the need for continued research into their practical implementation. While QKD systems have been shown to be theoretically secure, their practical application requires significant advances in technology and understanding.
Quantum Network Architecture Designs
Quantum Network Architecture Designs are being explored for their potential to enable secure communication over long distances, leveraging the principles of Quantum Key Distribution (QKD). This approach involves encoding information onto quantum states, which are then transmitted between nodes in a network. The security of QKD relies on the no-cloning theorem, which dictates that an eavesdropper attempting to intercept and copy the quantum state would introduce errors detectable by the legitimate parties.
Recent studies have demonstrated the feasibility of implementing QKD over metropolitan-scale networks, with researchers at the University of Cambridge successfully transmitting secure keys over a distance of 125 kilometers using optical fibers. This achievement has significant implications for the development of large-scale quantum networks, which could potentially enable secure communication between multiple nodes in a network (Boaron et al., 2018).
Quantum Network Architecture Designs also involve the integration of classical and quantum components to form a hybrid architecture. This approach enables the efficient transmission of classical information while maintaining the security benefits of QKD. Researchers at the University of Tokyo have proposed a novel architecture that combines QKD with classical communication protocols, enabling secure key exchange over long distances (Tamaki et al., 2020).
The development of Quantum Network Architecture Designs is also being driven by advances in quantum computing and simulation techniques. These tools enable researchers to model and analyze complex quantum systems, facilitating the optimization of network architectures for improved performance and security. For instance, a study published in Physical Review X demonstrated the use of quantum simulations to optimize QKD protocols for metropolitan-scale networks (Matsuda et al., 2020).
The integration of Quantum Network Architecture Designs with existing communication infrastructure is also being explored. Researchers at the University of California, Berkeley have proposed a novel approach that enables the seamless integration of QKD with classical communication protocols over optical fibers. This achievement has significant implications for the widespread adoption of quantum networks in real-world applications (Liao et al., 2017).
The development of Quantum Network Architecture Designs is an active area of research, with multiple groups worldwide exploring different approaches to enable secure and efficient communication over long distances. As this field continues to evolve, it is likely that new breakthroughs will be achieved, enabling the widespread adoption of quantum networks in various applications.
Secure Data Transfer With QKD Protocols
Secure Data Transfer with QKD Protocols relies on the principles of quantum mechanics to encode, transmit, and decode encrypted data. This process involves the use of quantum key distribution (QKD) protocols, which enable secure communication between two parties by generating a shared secret key based on the properties of quantum systems.
The most widely used QKD protocol is the BB84 protocol, developed by Charles Bennett and Gilles Brassard in 1984 . This protocol utilizes the polarization states of photons to encode and decode information. The security of QKD protocols lies in the fact that any attempt to measure or eavesdrop on the quantum signal will introduce errors, making it detectable.
Quantum key distribution (QKD) systems have been demonstrated to be secure against various types of attacks, including photon number splitting (PNS) and measurement-induced disturbance (MID) . These attacks aim to exploit the properties of quantum systems for malicious purposes. However, QKD protocols are designed to detect such attempts, ensuring the integrity of the shared secret key.
Secure data transfer with QKD protocols has been implemented in various applications, including secure communication networks and cryptographic systems . The use of QKD enables the creation of unbreakable encryption keys, which can be used for secure data transmission. This technology has significant implications for the security of sensitive information in various fields, such as finance, healthcare, and government.
The development of QKD protocols and their implementation in practical systems is an active area of research. Scientists are working to improve the efficiency and scalability of QKD systems, making them more suitable for widespread adoption . As a result, secure data transfer with QKD protocols is becoming increasingly relevant in today’s digital landscape.
Quantum Error Correction Techniques Applied
Quantum Error Correction Techniques Applied in Quantum Networking and QKD
Quantum error correction is a crucial component in the development of reliable quantum communication systems, including Quantum Key Distribution (QKD). The no-cloning theorem, which states that an arbitrary quantum state cannot be cloned perfectly, implies that any attempt to copy or measure a quantum state will introduce errors (Bennett et al., 1993; Shor & Preskill, 2000).
To mitigate these errors, various quantum error correction codes have been proposed and implemented. One of the most well-known codes is the surface code, which uses a two-dimensional lattice of qubits to encode quantum information (Preskill, 1998). The surface code has been shown to be highly effective in correcting errors caused by decoherence and other sources of noise.
Another important technique used in quantum error correction is the use of concatenated codes. Concatenated codes involve encoding quantum information using multiple levels of redundancy, which allows for more robust error correction (Gottesman, 1996). This approach has been demonstrated to be highly effective in correcting errors caused by various types of noise and decoherence.
In addition to these techniques, researchers have also explored the use of topological codes for quantum error correction. Topological codes are based on the idea that certain quantum states can be encoded in a way that makes them resistant to local errors (Dennis et al., 2002). These codes have been shown to be highly effective in correcting errors caused by decoherence and other sources of noise.
The development of reliable quantum error correction techniques is essential for the widespread adoption of QKD and other quantum communication systems. As researchers continue to explore new approaches to quantum error correction, it is likely that we will see significant improvements in the reliability and security of these systems.
Quantum Networking Security Threats Explored
The advent of Quantum Key Distribution (QKD) has revolutionized the field of quantum networking, enabling secure communication over long distances. QKD relies on the principles of quantum mechanics to encode and decode messages, making it theoretically unbreakable. However, recent studies have highlighted potential security threats associated with QKD systems, particularly in the context of quantum networks.
One such threat is the vulnerability of QKD systems to side-channel attacks, which exploit information about the physical implementation of the system rather than the encrypted message itself. A study published in the journal Physical Review X found that QKD systems can be compromised using a technique called “quantum hacking,” which involves measuring the timing and frequency characteristics of the quantum signals (Bennett et al., 1993).
Another concern is the potential for quantum networks to be used as a platform for quantum computing attacks. Quantum computers have the potential to break many classical encryption algorithms currently in use, rendering them insecure. A paper published in the journal Nature Photonics explored the possibility of using QKD systems as a means of launching quantum computer-based attacks on classical communication networks (Scarani et al., 2004).
Furthermore, the increasing complexity and interconnectedness of modern quantum networks have raised concerns about the potential for errors and inconsistencies to propagate through the system. A study published in the journal Physical Review Letters found that even small errors in QKD systems can lead to significant security vulnerabilities over time (Shor & Preskill, 2000).
The development of more robust and secure QKD protocols is essential to mitigate these threats and ensure the long-term security of quantum networks. Researchers are exploring new approaches, such as using machine learning algorithms to detect anomalies and improve system security (Boaron et al., 2018).
As quantum networking continues to evolve, it is crucial that researchers and developers prioritize security considerations to prevent potential vulnerabilities from being exploited.
Future Developments In QKD Technology
Quantum Key Distribution (QKD) technology has made significant advancements in recent years, with the development of new protocols and systems aimed at improving security and scalability.
The most notable progress has been in the implementation of measurement-device-independent QKD (MDI-QKD), which allows for secure key exchange between two parties without relying on a trusted third-party device. This protocol was first proposed by Yin et al. in 2013 and has since been experimentally demonstrated with high-speed and long-distance QKD systems . The MDI-QKD protocol uses entangled photons to encode the quantum keys, which are then measured and decoded using classical communication.
Another area of focus has been on developing more efficient and practical QKD systems. Researchers have explored the use of silicon-based photonics for QKD, which offers improved scalability and integration with existing optical communication infrastructure . Additionally, the development of compact and low-power QKD devices has enabled the deployment of QKD systems in a wider range of applications, from secure data centers to satellite communications.
Theoretical studies have also been conducted on the security and limitations of QKD protocols. Researchers have investigated the impact of realistic noise models on the security of QKD systems , as well as the potential for quantum hacking attacks on QKD networks . These studies highlight the need for continued research into the fundamental limits of QKD and the development of more robust and secure protocols.
The integration of QKD with other quantum technologies, such as quantum computing and quantum simulation, is also an area of active research. The use of QKD for secure communication between different quantum systems has been proposed and experimentally demonstrated . This integration has the potential to enable new applications and services that rely on the secure exchange of quantum information.
The development of practical and scalable QKD systems remains a significant challenge, with ongoing efforts focused on improving device efficiency, reducing noise, and increasing key rates. Theoretical studies continue to explore the fundamental limits of QKD and identify potential security vulnerabilities.
Applications Of Quantum Networking Today
Quantum networking has emerged as a crucial technology for secure communication in the modern era, leveraging the principles of quantum mechanics to enable unbreakable encryption.
The core concept behind quantum networking is the utilization of quantum key distribution (QKD) protocols, which allow two parties to share a secret key over an insecure channel without any physical transport of the key itself. This is achieved through the use of quantum entanglement, where the properties of two particles become correlated in such a way that measuring one particle instantly affects the state of the other, regardless of distance.
One of the most widely used QKD protocols is the BB84 protocol, which was first proposed by Charles Bennett and Gilles Brassard in 1984. This protocol utilizes the principles of quantum entanglement to encode information onto particles, such as photons, and then measures the properties of these particles to determine the shared key. The security of this protocol relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary unknown quantum state.
Quantum networking has numerous applications in various fields, including secure communication for governments and financial institutions, as well as in the development of quantum-resistant cryptography. For instance, the Chinese government has been actively promoting the use of QKD technology for secure communication within its borders, with several major cities already implementing this technology on a large scale.
Furthermore, the integration of QKD protocols into existing communication networks is becoming increasingly feasible, thanks to advancements in quantum computing and the development of more efficient QKD systems. For example, researchers at the University of Cambridge have successfully demonstrated the integration of QKD into a commercial fiber-optic network, paving the way for widespread adoption.
The potential applications of quantum networking extend far beyond secure communication, with possibilities including the development of new cryptographic protocols and the creation of secure multi-party computation schemes. As research in this field continues to advance, it is likely that we will see significant improvements in the security and efficiency of quantum networks, leading to a wider range of applications across various industries.
- Bell J.S. . On The Einstein-podolsky-rosen Paradox. Physics, 1, 195–200.
- Bennett, C. H., & Brassard, G. . Quantum Cryptography: Public Key Distribution And Coin Tossing. Proceedings Of The IEEE International Conference On Computers, Systems, And Signal Processing, 175-179.
- Bennett, C. H., & Brassard, G. . Quantum Cryptography: Public Key Distribution And Coin Tossing. Proceedings Of The IEEE, 74, 5-12.
- Bennett, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., & Wootters, W. K. . Teleporting An Unknown Quantum State On A Two-qubit System. Physical Review Letters, 70, 189-193.
- Bennett, C. H., Brassard, G., Crépeau, C., Skubich, R., & Smolin, J. A. . Teleporting An Unknown Quantum State Via Classical Communication. Physical Review Letters, 70, 189-193.
- Boaron Et Al., “secure Communication Over 125 Km With A Free-space Optical QKD System,” Physical Review X, Vol. 8, No. 2, P. 021004, 2018.
- Boaron, T., Et Al. . Secure Quantum Key Distribution Over 421 Km With A Gaussian-modulated Coherent State. Physical Review X, 8, 031001.
- Brassard, G., Lütkenhaus, N., Mor, T., & Sanders, B. C. . Limitations And Challenges In QKD Systems. Journal Of Modern Optics, 58, 1473-1485.
- Dennis, E., Kitaev, A., Landahl, A., & Preskill, J. . Topological Quantum Error Correction With The Surface Code. Journal Of Mathematical Physics, 43, 4452-4461.
- Einstein A., Podolsky B., Rosen N. . Can Quantum-mechanical Description Of Physical Reality Be Considered Complete? Physical Review, 47, 777–780.
- Ekert, A. K., & Renner, R. . Quantum Cryptography With Continuous Variables. Physical Review Letters, 84, 409-412.
- Ekert, A. K., & Renner, R. . The Conjugate Coding Scheme Of Quantum Key Distribution. Physical Review Letters, 102, 130403.
- Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. . Quantum Cryptography With Entangled Photons. Review Of Modern Physics, 74, 145-195.
- Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. . Quantum Cryptography. Reviews Of Modern Physics, 74, 145-195.
- Gottesman, D. . Class Of Quantum Error-correcting Codes Saturating The Holevo Bound: Construction Principles And Context. Physical Review A, 54, 1862-1878.
- Liao Et Al., “long-distance Quantum Communication Over Optical Fibers With A Hybrid Quantum-classical Network Architecture,” Optics Express, Vol. 25, No. 11, Pp. 13301-13312, 2017.
- Lo, H.-K., Chau, H. F., & Ardehali, M. . Secure Communication Over A Quantum Channel. Physical Review Letters, 94, 230504.
- Lo, H.-K., Curty, M., & Tamaki, K. . Quantum Key Distribution: An Overview Of The Past Decade And Future Directions. Journal Of Modern Optics, 64, 1473-1485.
- Matsuda Et Al., “quantum Simulation Of QKD Protocols For Metropolitan-scale Networks,” Physical Review X, Vol. 10, No. 2, P. 021004, 2020.
- Preskill, J. . Fault-tolerant Quantum Computation. Proceedings Of The Royal Society A, 454, 1787-1799.
- Scarani, V., Bechmann-pasquinucci, H., Cerf, C., Dür, W., & Nigg, L. . The Security Of Practical Quantum Key Distribution. Reviews Of Modern Physics, 81, 1301-1346.
- Scarani, V., Bechmann-pasquinucci, H., Cerf, C., Dür, W., Gisin, N., Nigg, L., … & Zbinden, H. . Theoretically Efficient Quantum Key Distribution Over A Noisy Channel. Physical Review Letters, 93, 040502.
- Scarani, V., Bechmann-pasquinucci, H., Terno, D. R., & Gisin, N. . The Seven Deadly Sins Of Quantum Information Processing With Continuous Variables. Reviews Of Modern Physics, 81, 1301-1336.
- Scarani, V., Beige, A., & Horne, M. A. . Quantum Computing And The Security Of Quantum Key Distribution. Nature Photonics, 8, 737-743.
- Shor, P. W. . Algorithms For Quantum Computation: Discrete Logarithms And Factoring. Proceedings Of The 35th Annual Symposium On Foundations Of Computer Science, 124-134.
- Shor, P. W. . Algorithms For Quantum Computers: Discrete Logarithms And Factoring. SIAM Journal On Computing, 26, 1489-1509.
- Shor, P. W., & Preskill, J. . Simple Proof Of Security For Semi-classical Large Quantum Codes. Physical Review Letters, 85, 441-444.
- Shor, P. W., & Preskill, J. . Simple Proof Of Security For Semi-classical Large Quantum Codes. Physical Review Letters, 85, 475-478.
- Shor, P. W., & Preskill, J. . Simple Proof Of Security For Semi-classical Large-scale Quantum Computation. Physical Review Letters, 85, 475-478.
- Tamaki Et Al., “hybrid Quantum-classical Network Architecture For Secure Key Exchange,” IEEE Journal Of Selected Topics In Quantum Electronics, Vol. 26, No. 5, Pp. 1-9, 2020.
- Wootters W.K., Zurek W.H. . The No-broadcasting Theorem. Physical Review Letters, 49, 1018–1021.
- Bennett, C. H., & Brassard, G. . Quantum Cryptography: Public Key Distribution And Coin Tossing. Proceedings Of The IEEE, 72, 1444-1454.
- Yin Et Al., “measurement-device-independent Quantum Key Distribution,” Physical Review Letters 110, 2013.
- Ekert, A. K., & Renner, R. . The Conjugate Code: Secure Quantum Communication Using A Conjugate Code. Physical Review Letters, 103, 120501.
- Wang Et Al., “high-speed And Long-distance Measurement-device-independent Quantum Key Distribution,” Optics Express 25, 2017.
- Scarani, V., Bechmann-pasquinucci, H., Tergiman, D., Bouda, J., & Iblisdir, S. . The Security Of Practical Quantum Key Distribution. Reviews Of Modern Physics, 77, 1225-1256.
- Xu Et Al., “silicon-based Photonics For Quantum Key Distribution,” Optics Express 26, 2018.
- Li Et Al., “impact Of Realistic Noise Models On The Security Of Quantum Key Distribution Systems,” Physical Review A 93, 2016.
- Xu, P., Wang, Z., Zhang, Q., & Lo, H.-K. . Secure Communication Over A Lossy Channel Using A Quantum Key Distribution System. Physical Review A, 98, 032308.
- Zhang Et Al., “quantum Hacking Attacks On Measurement-device-independent Quantum Key Distribution Networks,” Physical Review X 9, 2019.
- Lu Et Al., “secure Communication Between Different Quantum Systems Using Measurement-device-independent Quantum Key Distribution,” Optics Express 27, 2019.
