2013
DOI: 10.1109/mcom.2013.6576336
|View full text |Cite
|
Sign up to set email alerts
|

Management of security in quantum cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…Quantum mechanics can be used for cryptography independent of quantum computers. Currently, quantum cryptography is still not used to protect privacy, but it is already used to provide security [NP13].…”
Section: Ppp4 Based On Quantum Mechanicsmentioning
confidence: 99%
“…Quantum mechanics can be used for cryptography independent of quantum computers. Currently, quantum cryptography is still not used to protect privacy, but it is already used to provide security [NP13].…”
Section: Ppp4 Based On Quantum Mechanicsmentioning
confidence: 99%
“…In [30] a study of quantum cryptography was conducted including in details description of protocol BB84.…”
Section: B Quantum Gatesmentioning
confidence: 99%
“…The classical channel is used to verify whether there was an eavesdropper on the network attempting to get the key. The quantum channel is used for transmitting the qubits which are used to generate the key [5,6].…”
Section: Preliminariesmentioning
confidence: 99%
“…Figure 2 shows polarized light passing through a birefringent calcite crystal material. The light is then split into vertical and horizontal polarization components at the output or extraordinary and ordinary ray respectively [6,24,26]. Figure 3 shows an experiment with a single photon.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation