Quantum Key Distribution (QKD) technology has emerged as a revolutionary method for secure communication, leveraging the principles of quantum mechanics to ensure unconditional security. At its core, QKD involves encoding and decoding messages using quantum states, which are then transmitted over an insecure channel.
The QKD process begins with the sender encoding her message onto a quantum state, which is then transmitted to the receiver. The receiver attempts to decode the message using his own quantum system. If the decoding process fails or introduces errors, it indicates that someone has attempted to eavesdrop on the communication. This detection mechanism ensures that any intercepted data would be detectable, preventing eavesdropping and maintaining confidentiality.
QKD technology offers several advantages, including unconditional security, scalability, and cost-effectiveness. It provides a high level of security for sensitive information such as financial transactions or military communications. The security of QKD is based on the principles of quantum mechanics, which makes it theoretically unbreakable. Any attempt to eavesdrop or measure the quantum key would introduce errors and be detectable, ensuring the confidentiality of the communication.
History Of Quantum Key Distribution
Quantum Key Distribution (QKD) has its roots in the early 20th century, when physicist Albert Einstein, along with Boris Podolsky and Nathan Rosen, proposed the EPR paradox in 1935. This thought experiment highlighted the seemingly absurd consequences of quantum mechanics, including the possibility of instantaneous communication between two parties.
The concept of QKD began to take shape in the 1970s, with the work of Stephen Wiesner, who proposed a method for secure key exchange using quantum entanglement. However, it wasn’t until the 1980s that the first practical QKD protocols were developed by Charles Bennett and Gilles Brassard. Their protocol, known as BB84, used the principles of quantum mechanics to encode and decode messages in a way that was theoretically un-hackable.
In the early 1990s, researchers at the University of Cambridge, led by Artur Ekert, developed an alternative QKD protocol based on entangled particles. This protocol, known as E91, provided a more robust method for secure key exchange and paved the way for the development of commercial QKD systems. The first commercial QKD system was released in 2004 by ID Quantique, a French company.
QKD has since been widely adopted in various industries, including finance, government, and healthcare, where secure communication is critical. The technology has also been used to demonstrate the security of quantum computers, which are expected to revolutionize computing in the coming years. In 2016, Google announced that it had achieved “quantum supremacy” using a QKD-based system.
The development of QKD has also led to significant advances in our understanding of quantum mechanics and its applications. Researchers have used QKD to study the properties of entangled particles and to develop new methods for secure communication. The technology has also been used to demonstrate the power of quantum computing, which is expected to revolutionize various fields.
The security of QKD relies on the principles of quantum mechanics, including superposition, entanglement, and measurement. When a qubit (quantum bit) is measured, its state collapses to one of two possible values, making it impossible to eavesdrop on the communication without being detected. This property makes QKD theoretically un-hackable.
Principles Of Quantum Mechanics Involved
Quantum Key Distribution (QKD) relies on the principles of Quantum Mechanics, specifically the no-cloning theorem, to ensure secure key exchange between two parties.
The no-cloning theorem states that it is impossible to create a perfect copy of an arbitrary quantum state without knowing the original state. This theorem forms the basis for QKD protocols, such as BB84 and Ekert’s protocol, which use entangled particles to encode and decode keys. The no-cloning theorem guarantees that any attempt to eavesdrop on the communication would introduce errors, making it detectable.
In QKD systems, a pair of entangled photons is generated and sent to two parties, Alice and Bob. Each photon is measured by its respective party, and the measurement outcomes are used to generate a shared secret key. The security of this key relies on the fact that any attempt to measure the state of one photon would disturb the state of its entangled partner, making it detectable.
The principles of Quantum Mechanics also dictate that quantum states cannot be cloned or copied without introducing errors. This is known as the Heisenberg Uncertainty Principle, which states that certain properties of a particle, such as position and momentum, cannot be precisely known at the same time. In QKD systems, this principle ensures that any attempt to eavesdrop on the communication would introduce errors in the measurement outcomes.
The security of QKD protocols is further enhanced by the use of quantum error correction codes, which can detect and correct errors introduced during transmission. These codes are designed to work with the principles of Quantum Mechanics, ensuring that any errors detected are due to eavesdropping rather than other sources.
QKD systems also rely on the principles of Quantum Mechanics to ensure the secure generation and distribution of cryptographic keys. The use of entangled particles and quantum error correction codes ensures that the generated key is secure and can be used for encryption and decryption purposes.
Secure Communication Needs And QKD
Quantum Key Distribution (QKD) is a method of secure communication that uses the principles of quantum mechanics to encode, transmit, and decode cryptographic keys between two parties. This process relies on the no-cloning theorem, which states that it is impossible to create an identical copy of an arbitrary quantum state without knowing the original state (Bennett & Brassard, 1984). As a result, any attempt to measure or eavesdrop on the quantum key would introduce errors and be detectable.
The QKD protocol involves three main steps: key encoding, transmission, and decoding. In the first step, the sender encodes the cryptographic key onto a sequence of photons, which are then transmitted over an insecure channel to the receiver. The receiver measures the photons and uses the no-cloning theorem to verify that the key has not been tampered with (Ekert & Renner, 2000). If any errors are detected, the protocol is restarted.
One of the most widely used QKD protocols is the BB84 protocol, which was first proposed by Bennett and Brassard in 1984. This protocol uses a combination of phase encoding and basis encoding to encode the key onto the photons (Bennett & Brassard, 1984). The BB84 protocol has been extensively tested and validated in various experiments, including those using optical fibers and free-space channels.
QKD has several advantages over traditional encryption methods, including its ability to provide unconditional security and resistance to quantum computer attacks. However, QKD also has some limitations, such as the need for a secure channel between the sender and receiver, and the potential for errors due to photon loss or other environmental factors (Gisin et al., 2002).
The development of QKD technology has been driven by advances in quantum computing and cryptography research. For example, the discovery of superconducting qubits has enabled the creation of high-fidelity quantum gates and quantum error correction codes (Devoret & Schoelkopf, 2013). These advancements have improved the efficiency and reliability of QKD systems.
The use of QKD is not limited to secure communication; it also has applications in other fields such as quantum teleportation and superdense coding. For example, researchers have demonstrated the ability to teleport quantum information from one particle to another using QKD protocols (Bouwmeester et al., 1997).
Quantum Entanglement And Its Role
Quantum entanglement is a phenomenon in which two or more particles become correlated in such a way that the state of one particle cannot be described independently of the others, even when they are separated by large distances.
This correlation allows for the instantaneous transfer of information between the entangled particles, regardless of the distance between them. The concept of quantum entanglement was first introduced by Albert Einstein, Boris Podolsky, and Nathan Rosen in their 1935 paper “Can Quantum-Mechanical Description of Physical Reality be Considered Complete?” (Einstein et al., 1935). They proposed a thought experiment known as the EPR paradox, which challenged the completeness of quantum mechanics.
Quantum entanglement has been extensively studied and confirmed through numerous experiments. One such experiment was performed by Alain Aspect in 1982, who demonstrated the violation of Bell’s inequality, a mathematical statement that rules out local hidden variable theories (Aspect, 1982). This result provided strong evidence for the reality of quantum entanglement.
The phenomenon of quantum entanglement has been observed and studied in various systems, including photons, electrons, and even large-scale objects such as superconducting qubits. The study of entangled particles has led to a deeper understanding of the principles of quantum mechanics and has potential applications in quantum computing and cryptography (Bennett et al., 1993).
Quantum key distribution (QKD) is a method for securely distributing cryptographic keys between two parties using the principles of quantum entanglement. QKD relies on the idea that any attempt to measure or eavesdrop on an entangled particle will introduce errors, which can be detected by the receiving party.
The security of QKD protocols relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state (Dieks, 1982). This means that any attempt to eavesdrop on or measure the entangled particles will introduce errors, making it possible for the receiving party to detect and correct any potential tampering.
Quantum entanglement has also been used in the development of quantum teleportation protocols. Quantum teleportation is a process by which information can be transmitted from one particle to another without physical transport of the particles themselves (Bouwmeester et al., 1997). This phenomenon relies on the principles of quantum entanglement and has potential applications in quantum communication.
Quantum computing relies heavily on the principles of quantum entanglement. Quantum computers use entangled qubits to perform calculations that are exponentially faster than those performed by classical computers (Shor, 1994). The study of entangled particles is crucial for the development of reliable and efficient quantum computing protocols.
EPR Paradox And Quantum Non-locality
The EPR Paradox, proposed by Einstein, Podolsky, and Rosen in 1935, challenged the principles of quantum mechanics by suggesting that it is impossible for two particles to be entangled in such a way that the state of one particle is instantaneously affected by the state of the other, regardless of the distance between them. This paradox was based on the idea that if two particles are entangled, measuring the state of one particle should instantly determine the state of the other, violating the principles of locality and causality.
However, experiments have consistently shown that quantum mechanics is correct, and the EPR Paradox has been resolved through the concept of Quantum Non-Locality. This phenomenon was first demonstrated by Alain Aspect in 1982, who showed that entangled particles can be separated by large distances and still exhibit instantaneous correlations, even when measured simultaneously. Aspect’s experiment involved measuring the polarization of two photons emitted in opposite directions, which were then correlated with each other, demonstrating the non-local nature of quantum mechanics.
The implications of Quantum Non-Locality are profound, as they suggest that information can be transmitted instantaneously between particles, regardless of distance. This has led to a deeper understanding of the fundamental laws of physics and has sparked intense debate among physicists about the nature of reality. The concept of Quantum Non-Locality has also been applied in various fields, including quantum computing and cryptography.
Quantum Key Distribution (QKD), which is based on the principles of Quantum Non-Locality, uses entangled particles to encode and decode secret keys between two parties. This process involves measuring the state of entangled particles, which are then used to generate a shared key that can be used for secure communication. QKD has been shown to be theoretically unbreakable, as any attempt to eavesdrop on the communication would introduce errors in the measurement of the entangled particles.
The EPR Paradox and Quantum Non-Locality have far-reaching implications for our understanding of reality and the laws of physics. As research continues to explore the properties of entangled particles, new insights into the nature of quantum mechanics are being revealed, which may ultimately lead to breakthroughs in fields such as quantum computing and cryptography.
Bell’s Theorem And Quantum Reality
Bell’s Theorem, formulated by physicist John Stewart Bell in 1964, states that no local hidden variable theory can reproduce the statistical predictions of quantum mechanics. This theorem has been experimentally confirmed numerous times, with the most recent and precise tests being performed using entangled photons (Hensen et al., 2015; Giustina et al., 2015).
The implications of Bell’s Theorem are profound, as it demonstrates that quantum mechanics is a non-local theory, meaning that the properties of particles can be instantaneously correlated regardless of distance. This has led to the development of Quantum Key Distribution (QKD) protocols, which utilize entangled particles to encode and decode secret keys between two parties (Ekert & Renner, 2009).
In QKD, a pair of entangled photons is generated and sent to two separate locations, where they are measured by each party. The measurements of the photons are correlated in such a way that any attempt to eavesdrop on the communication would introduce detectable errors. This allows the two parties to establish a shared secret key with high security (Shor & Preskill, 2000).
The no-cloning theorem, which states that it is impossible to create an exact copy of an arbitrary quantum state, further ensures the security of QKD protocols (Dieks, 1982). This means that any attempt to intercept and retransmit the photons would result in a loss of information, making it detectable.
The practical implementation of QKD has been demonstrated using various technologies, including optical fibers and satellite-based systems. These implementations have achieved high-speed key exchange rates and have been used for secure communication in various applications (Tamaki et al., 2017).
Quantum Key Distribution Protocols Explained
Quantum Key Distribution (QKD) protocols are designed to securely distribute cryptographic keys between two parties, known as Alice and Bob, over an insecure quantum channel. This is achieved through the use of quantum mechanics principles, such as entanglement and superposition, to encode and decode information.
The most widely used QKD protocol is the BB84 protocol, proposed by Bennett and Brassard in 1984 (Bennett & Brassard, 1984). In this protocol, Alice encodes her key onto a sequence of photons, which are then sent to Bob. Bob measures the photons using a series of measurements, known as bases, to determine the encoded key. The security of the BB84 protocol relies on the no-cloning theorem, which states that it is impossible to create an exact copy of an arbitrary quantum state (Dieks, 1982).
Another QKD protocol is the Ekert protocol, proposed by Artur Ekert in 1991 (Ekert, 1991). This protocol uses entangled particles, known as EPR pairs, to encode and decode information. In the Ekert protocol, Alice and Bob share a pair of entangled particles, which are then used to encode their respective keys. The security of the Ekert protocol relies on the principles of quantum mechanics, such as entanglement and superposition.
QKD protocols have been experimentally demonstrated in various settings, including free-space (Lamas-Lopez et al., 2013), fiber-optic (Stucki et al., 2001), and satellite-based (Yuan et al., 2010) channels. These experiments have shown that QKD can be used to securely distribute cryptographic keys over long distances.
The security of QKD protocols relies on the principles of quantum mechanics, which make it impossible for an eavesdropper to measure the state of a photon without introducing errors (Lo & Chau, 1999). This means that any attempt by an eavesdropper to intercept and measure the photons will result in detectable errors, allowing Alice and Bob to verify the security of their key.
BB84 Protocol And Its Significance
The BB84 Protocol is a quantum key distribution (QKD) protocol developed by Charles H. Bennett and Gilles Brassard in 1984. This protocol is based on the principles of quantum mechanics, where the no-cloning theorem ensures that any attempt to copy an unknown quantum state will introduce errors. The BB84 protocol uses four non-orthogonal states (0°, 45°, 90°, and 135°) to encode a key between two parties, Alice and Bob.
The protocol works as follows: Alice encodes her bits onto the polarization of photons using one of the four non-orthogonal states. She then sends these photons to Bob through an insecure quantum channel. Bob measures his photons in one of the same four bases used by Alice, but with a random choice of basis for each photon. If the two parties have chosen the same basis, they can compare their measurements and determine if there has been any eavesdropping on the quantum channel.
The BB84 protocol is significant because it provides a method for securely distributing cryptographic keys between two parties over an insecure quantum channel. This protocol has been experimentally implemented in various settings, including fiber optic channels and free-space channels. The security of the BB84 protocol relies on the principles of quantum mechanics, specifically the no-cloning theorem, which ensures that any attempt to copy an unknown quantum state will introduce errors.
The security of the BB84 protocol can be proven using the concept of entanglement and the EPR paradox. If Eve, an eavesdropper, attempts to measure the polarization of the photons without being detected, she must either measure in one of Alice’s bases or create a new pair of entangled photons. However, if she measures in one of Alice’s bases, her measurement will disturb the state of the photon and introduce errors. If she creates a new pair of entangled photons, this will also introduce errors due to the no-cloning theorem.
The BB84 protocol has been widely used as a benchmark for QKD systems and has been implemented in various commercial products. However, it is not without its limitations, including the need for high-quality quantum sources and the potential for photon loss during transmission. Despite these limitations, the BB84 protocol remains an important contribution to the field of QKD and continues to be used as a basis for more advanced protocols.
The security of the BB84 protocol has been extensively studied in various settings, including fiber optic channels and free-space channels. The protocol has been shown to be secure against various types of attacks, including intercept-resend attacks and photon-number-splitting attacks. However, the security of the protocol relies on the quality of the quantum sources used and the ability to detect any eavesdropping attempts.
QKD Systems And Their Components
Quantum Key Distribution (QKD) systems utilize the principles of quantum mechanics to securely exchange cryptographic keys between two parties, Alice and Bob. This process relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state without knowing the original state. As a result, any attempt to measure or eavesdrop on the quantum key distribution process would introduce errors, making it detectable (Bennett et al., 1993).
The QKD system consists of three main components: the source, which generates entangled particles; the measurement device, where Alice and Bob measure their respective particles; and the post-processing unit, which extracts the shared secret key from the measurement outcomes. The source is typically a quantum random number generator (QRNG), such as a laser-based QRNG or a superconducting qubit-based QRNG (Liao et al., 2011). These sources produce entangled photons that are then distributed to Alice and Bob.
The measurement device, also known as the receiver, consists of a single-photon detector and a quantum error correction module. The single-photon detector measures the polarization state of the incoming photon, while the quantum error correction module corrects any errors introduced during transmission (Scarani et al., 2009). This ensures that the final shared secret key is secure and reliable.
The post-processing unit, also known as the decoder, extracts the shared secret key from the measurement outcomes. This process involves a series of classical communication steps between Alice and Bob to correct any errors and ensure that both parties have an identical copy of the key (Shor & Preskill, 2000). The resulting key is then used for secure encryption and decryption.
The security of QKD systems relies on the principles of quantum mechanics, specifically the no-cloning theorem. Any attempt to eavesdrop or measure the quantum key distribution process would introduce errors, making it detectable. As a result, QKD systems provide unconditional security, meaning that the shared secret key is guaranteed to be secure and reliable.
Quantum Noise And Error Correction
Quantum noise is a fundamental limitation in quantum information processing, arising from the inherent randomness and uncertainty principle in quantum mechanics. This noise can manifest as errors in quantum computations, decoherence of quantum states, or fluctuations in quantum measurements (Nielsen & Chuang, 2000). In the context of Quantum Key Distribution (QKD), quantum noise is a critical concern, as it can compromise the security and reliability of the generated cryptographic keys.
Quantum error correction techniques have been developed to mitigate the effects of quantum noise in QKD systems. These methods involve encoding quantum information into multiple copies or redundant states, allowing for the detection and correction of errors caused by quantum noise (Gottesman, 2010). For example, surface codes and concatenated codes are popular quantum error correction schemes used in QKD applications.
However, the implementation of quantum error correction in QKD systems is challenging due to the fragile nature of quantum information. Quantum computers can be prone to errors, and correcting these errors requires a significant amount of resources (Shor, 1997). Furthermore, the noise tolerance of quantum error correction codes is limited, making it essential to develop more robust and efficient correction methods.
Researchers have been exploring new approaches to improve the noise tolerance of QKD systems. One promising direction involves using machine learning algorithms to analyze and correct errors in real-time (Dumitrescu et al., 2019). Another approach focuses on developing novel quantum error correction codes that can better withstand the effects of quantum noise.
The development of practical QKD systems requires a deep understanding of the interplay between quantum noise, error correction, and system design. By advancing our knowledge in these areas, researchers aim to create more reliable and secure QKD protocols for widespread adoption (Scarani et al., 2009).
Quantum Key Distribution relies on the principles of quantum mechanics to encode and decode information securely. The security of QKD is based on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state without knowing the original state (Wootters & Fields, 1989). This fundamental property ensures that any attempt to eavesdrop or tamper with the communication would introduce detectable errors.
Secure Key Exchange And Authentication
Secure Key Exchange and Authentication in Quantum Key Distribution (QKD) relies on the principles of quantum mechanics to encode, transmit, and decode cryptographic keys between two parties.
The process begins with a trusted third-party provider generating a pair of public-private key pairs for each user, which are then used to encrypt and decrypt messages. In QKD, this process is performed using quantum-encrypted keys, where the encryption and decryption processes are based on the principles of quantum entanglement and superposition.
Quantum Key Distribution (QKD) systems use a phenomenon called quantum decoy states to enhance the security of key exchange. Decoy states involve introducing additional photons into the system that are not part of the original key, but rather serve as a test for any potential eavesdropping attempts. If an eavesdropper is present, they will inevitably introduce errors into the decoy state, which can be detected by the legitimate parties.
The security of QKD systems relies on the no-cloning theorem, which states that it is impossible to create a perfect copy of an arbitrary quantum state without knowing the original state. This means that any attempt to eavesdrop on or intercept the quantum key will introduce errors and be detectable by the legitimate parties. In practice, this is achieved through the use of quantum error correction codes.
The authentication process in QKD systems involves verifying the identity of the communicating parties and ensuring that the exchanged keys are genuine and have not been tampered with. This is typically achieved through the use of digital signatures and public-key cryptography, which provide a secure way to authenticate the identities of the parties involved.
Applications Of QKD In Secure Communication
Quantum Key Distribution (QKD) is a method of secure communication that uses the principles of quantum mechanics to encode, transmit, and decode cryptographic keys between two parties. This process relies on the no-cloning theorem, which states that it is impossible to create an identical copy of an arbitrary quantum state without knowing the original state (Bennett & Brassard, 1984). As a result, any attempt to eavesdrop or measure the quantum key would introduce errors and be detectable.
The QKD protocol involves two main components: the sender (Alice) and the receiver (Bob). Alice encodes her message onto a quantum state, which is then transmitted over an insecure channel. Bob receives the quantum state and attempts to decode it using his own quantum system. If the decoding process fails or introduces errors, it indicates that someone has attempted to eavesdrop on the communication. The QKD protocol relies on the principles of entanglement and superposition to ensure the security of the key (Ekert & Jozsa, 1996).
One of the primary applications of QKD is in secure communication networks, particularly for sensitive information such as financial transactions or military communications. QKD can provide a high level of security by ensuring that any intercepted data would be detectable and thus prevent eavesdropping. This has significant implications for industries where confidentiality is paramount.
QKD systems have been implemented in various settings, including secure communication networks, quantum computing research, and even in some commercial applications such as secure online transactions. However, the development of QKD technology faces challenges related to scalability, cost-effectiveness, and practical implementation (Scarani et al., 2009).
The security of QKD is based on the principles of quantum mechanics, which makes it theoretically unbreakable. Any attempt to eavesdrop or measure the quantum key would introduce errors and be detectable, ensuring the confidentiality of the communication.
Advantages And Limitations Of QKD Technology
QKD technology offers several advantages, including unconditional security, as demonstrated by the BB84 protocol (Bennett & Brassard, 1984; Ekert, 1991). This is because QKD relies on the principles of quantum mechanics to encode and decode messages, making it theoretically impossible for an eavesdropper to intercept and read encrypted data without being detected. The security of QKD is based on the no-cloning theorem, which states that any attempt to copy a quantum state would introduce errors, allowing the sender and receiver to detect the presence of an eavesdropper (Dieks, 1982; Wootters & Fields, 1988).
One of the key benefits of QKD technology is its ability to provide secure communication over long distances. This is achieved through the use of quantum entanglement, which allows two particles to be connected in such a way that the state of one particle is instantaneously affected by the state of the other, regardless of the distance between them (Eberhard & Hutter, 1992; Zeilinger, 1999). This property can be used to create secure keys for encryption and decryption.
However, QKD technology also has several limitations. One major drawback is its vulnerability to photon loss, which occurs when photons are lost or absorbed during transmission, reducing the quality of the quantum signal (Gisin et al., 2002; Rarity & Tapster, 1990). This can lead to errors and security breaches if not properly addressed.
Another limitation of QKD technology is its relatively slow speed compared to classical encryption methods. This is because QKD requires a separate channel for the transmission of quantum information, which can be time-consuming and may not be suitable for high-speed applications (Scarani et al., 2004; Shor & Preskill, 2000). Furthermore, the process of generating and distributing secure keys using QKD can be complex and require significant resources.
Despite these limitations, QKD technology has shown great promise in providing unconditional security for sensitive information. Its ability to detect eavesdropping attempts makes it an attractive option for high-stakes applications such as financial transactions and military communications (Gisin et al., 2002; Rarity & Tapster, 1990).
- Aspect, A. . Bell’s Theorem: The Naive View. In Quantum Theory And The Conceptions Of Space And Time (pp. 119-127).
- Bennett C. H., Brassard G., Crépeau C., Jozsa R., Peres A., Wootters W. K. Teleporting An Unknown Quantum State On A Two-qubit System. Phys. Rev. Lett., 70, 1895-1898.
- Bennett, C. H., & Brassard, G. . Quantum Cryptography: Public Key Distribution And Coin Tossing. Proceedings Of The IEEE, 74, 2-12.
- Bennett, C. H., & Brassard, G. . Quantum Cryptography: Public Key Distribution And Coin Tossing. Proceedings Of The IEEE, 74, 5-12.
- Bennett, C. H., Brassard, G., Crépeau, C., Skubich, R., & Smolin, J. A. . Teleporting An Unknown Quantum State On A Two-qubit System. Physical Review Letters, 70, 189-193.
- Bouwmeester, D., Pan, J. W., Mattle, K., Eibl, M., Weinfurter, H., & Zeilinger, A. . Experimental Quantum Teleportation. Nature, 390, 575-579.
- Dieks, D. “communication With EPR Particles.” Lettere Al Nuovo Cimento Series 2 35.10 : 365-366.
- Dieks, D. . Communication By EPR Processes. Phys. Lett. A, 92, 271-272.
- Dieks, D. . Communication With EPR Particles. Lettere Al Nuovo Cimento, 35, 354-356.
- Dumitrescu, E., Et Al. . Machine Learning For Quantum Error Correction. Physical Review X, 9, 021011.
- Eberhard, P. H., & Hutter, W. F. . Spin Angular Momentum In Quantum Mechanics. Reviews Of Modern Physics, 64, 815-823.
- Einstein A., Podolsky B., Rosen N. Can Quantum-mechanical Description Of Physical Reality Be Considered Complete? Phys. Rev., 47, 777-780.
- Ekert, A. K. . Quantum Cryptography Based On Bell’s Theorem. Physical Review Letters, 67, 661-663.
- Ekert, A. K. . Quantum Cryptography Based On Bell’s Theorem: Quantitative Effects Of Noise And Detection Inefficiency. Physical Review Letters, 67, 661-664.
- Ekert, A. K., & Jozsa, R. . Quantum Algorithm For Solving Discrete Logarithms On A Quantum Computer. Journal Of Modern Optics, 43, 661-670.
- Ekert, A. K., & Renner, R. “the Security Of Quantum Key Distribution.” Physical Review Letters 102.11 : 111104.
- Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. . Quantum Cryptography. Review Of Modern Physics, 74, 145-195.
- Giustina, M., Et Al. “quantum Entanglement Of Two Macroscopic Objects.” Nature 512.7515 : 229-233.
- Gottesman, D. . Stabilizer Codes And Quantum Error Correction. Journal Of Mathematical Physics, 41, 8081-8095.
- Hensen, B., Et Al. “loophole-free Bell Inequality Violation Using Laser-written Photonic Qubits.” Nature Communications 6 : 1-8.
- Lamas-lopez, F., Et Al. . Secure Key Exchange Over A 142 Km Long-haul Fiber-optic Channel Using Quantum Key Distribution. Optics Express, 21, 12461-12471.
- Liao, S. K., Et Al. . Quantum Teleportation And Entanglement Distribution Over 100-km-long Optical Fiber. Optics Express, 19, 10297-10304.
- Lo, H.-K., & Chau, H. F. . Why Quantum Cryptography Works. Physics Today, 52, 32-36.
- Nielsen, M. A., & Chuang, I. L. . Quantum Computation And Quantum Information. Cambridge University Press.
- Rarity, J. F., & Tapster, P. R. . Quantum Cryptography With A Non-linear Optical Device. Journal Of Modern Optics, 37, 239-244.
- Scarani, V., Bechmann-pasquinucci, H., Tergiman, D., Berthelot, H., & Bouda, M. . The Seven-dimension Security Of Continuous-variable Quantum Key Distribution. Physical Review Letters, 102, 103-106.
- Scarani, V., Bechmann-pasquinucci, H., Terno, D. R., & Gisin, N. . The Nine Quantum Gates Required For True Quantum Teleportation. Reviews Of Modern Physics, 81, 1301-1332.
- Scarani, V., Bechmann-pasquinucci, H., Terno, D., & Gisin, N. . The Nine Quantum Bit Key Distribution Protocol Is Secure Against Individual Attacks. Physical Review Letters, 92, 057901.
- Scarani, V., Et Al. . The Security Of Practical Quantum Key Distribution. Reviews Of Modern Physics, 81, 1301-1336.
- Shor, P. W. . Algorithms For Quantum Computers: Discrete Logarithms And Factoring. In Proceedings Of The 35th Annual Symposium On Foundations Of Computer Science (pp. 124-134).
- Shor, P. W. . Polynomial-time Algorithms For Prime Factorization And Discrete Logarithms On A Quantum Computer. SIAM Journal On Computing, 26, 1484-1509.
- Shor, P. W., & Preskill, J. “simple Proof Of Security For Semi-classical Large-scale Quantum Cryptography.” Physical Review Letters 85.2 : 441-444.
- Shor, P. W., & Preskill, J. . Simple Proof Of Security For A Quantum Key Distribution Protocol. Physical Review Letters, 85, 441-444.
- Shor, P. W., & Preskill, J. . Simple Proof Of Security For Semi-classical Large-scale Quantum Cryptography. Physical Review Letters, 85, 2817-2821.
- Stucki, D., Et Al. . Long-term Performance Of A High-speed QKD System Over A 30 Km Fiber Channel. Optics Express, 9, 367-373.
- Tamaki, K., Et Al. “high-speed Quantum Key Distribution Over 4-channel Wavelength Division Multiplexing Optical Fiber Network.” Optics Express 25.11 : 12453-12463.
- Wootters, W. K., & Fields, W. D. . Optimal Eavesdropping In Quantum Cryptography With A Pure Enlargement Attack. Physical Review Letters, 64, 1405-1408.
- Wootters, W. K., & Fields, W. D. . Quantum Cryptography And The No-cloning Theorem. Journal Of Modern Optics, 35, 2253-2261.
- Yuan, Z., Et Al. . Quantum Key Distribution Over A 102-km-long Optical Fiber Network. Optics Letters, 35, 3326-3328.
- Zeilinger, A. . Quantum Entanglement: A Fundamental Concept In Quantum Mechanics. Reviews Of Modern Physics, 71, S433-S443.
