2021
DOI: 10.1103/physrevx.11.011038
|View full text |Cite|
|
Sign up to set email alerts
|

Agile and Versatile Quantum Communication: Signatures and Secrets

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…In principle, wavelength multiplexing could be leveraged to combine all signals into a single fiber, although further research on crosstalk effects and mitigation will be required to ensure performance is maintained. As an additional way to reduce the resource burden of traditional pair-wise QKD connections between all network users, quantum secret sharing (QSS) techniques [43][44][45][46][47] based on a full-mesh topology could be considered in lieu of dedicated point-to-point QKD systems for securing future QLANs.…”
Section: Discussionmentioning
confidence: 99%
“…In principle, wavelength multiplexing could be leveraged to combine all signals into a single fiber, although further research on crosstalk effects and mitigation will be required to ensure performance is maintained. As an additional way to reduce the resource burden of traditional pair-wise QKD connections between all network users, quantum secret sharing (QSS) techniques [43][44][45][46][47] based on a full-mesh topology could be considered in lieu of dedicated point-to-point QKD systems for securing future QLANs.…”
Section: Discussionmentioning
confidence: 99%
“…In 1984, Charles Bennett and Giller Brassard invented BB84 protocol. [12] Because the BB84 protocol can effectively detect eavesdropping and shut down communication, or redistribute the key until no one eavesdrops, the one-time cipher book assigned to A and B becomes an "unbreakable" encryption method that can encrypt classical communication and thus achieve completely secret encrypted communication.…”
Section: Approaches For Qcmentioning
confidence: 99%
“…In this work, we propose a strict QBA protocol that exploits the recursion method [37] and quantum digital signatures (QDS) [38][39][40][41][42][43][44][45][46][47][48][49][50][51] to address the limitation of the fault-tolerance bound and security loopholes, which exploits the nonrepudiation and unforgeability of the delivered messages and thus ensures consistency. We also compare our Here, we provide an example of a multicast round including n players with primary S. The forwarder is chosen from among the backups, and the other unchosen backups act as verifiers.…”
Section: Introductionmentioning
confidence: 99%