2019
DOI: 10.1364/josab.36.00qkd1
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution and beyond: introduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…Introduced originally in 2007 by M. Boyer, D. Kenigsberg, and T. Mor in [7], this field has seen growing interest over the years with new protocols, new cryptographic primitives, and new security proofs leading to a growing research area. Furthermore, as our society begins to move towards practical implementations of quantum communication networks [8,9,10,11], the semi-quantum model may hold unique benefits allowing for potentially cheaper devices (as less "quantum capable hardware" may be required) or devices that are more robust to hardware faults (as one may switch to a semi-quantum mode of operation if some devices fail). Finally, the theoretical and practical innovations necessary to study the semi-quantum model, where users are highly restricted in their abilities, may lead to great innovations in the broader field of quantum information science.…”
Section: Introductionmentioning
confidence: 99%
“…Introduced originally in 2007 by M. Boyer, D. Kenigsberg, and T. Mor in [7], this field has seen growing interest over the years with new protocols, new cryptographic primitives, and new security proofs leading to a growing research area. Furthermore, as our society begins to move towards practical implementations of quantum communication networks [8,9,10,11], the semi-quantum model may hold unique benefits allowing for potentially cheaper devices (as less "quantum capable hardware" may be required) or devices that are more robust to hardware faults (as one may switch to a semi-quantum mode of operation if some devices fail). Finally, the theoretical and practical innovations necessary to study the semi-quantum model, where users are highly restricted in their abilities, may lead to great innovations in the broader field of quantum information science.…”
Section: Introductionmentioning
confidence: 99%
“…First, consider that the eavesdropper chooses between the measurement bases (X + Z or X − Z) with 0.5 probability. However, non-matching detection events are ambiguous for the eavesdropper, which occur with 6 16 probability. In contrast, they get a double matching event with 9 16 probability.…”
Section: The Bases Choice Attack (Bc)mentioning
confidence: 99%
“…In the quantum era, Quantum key distribution (QKD) is one of the most promising technologies to secure the information intended to cross data networks. However, it has become unpostponable the development of new techniques for the rapid establishment of secret key information using quantum pulses over long distances [2][3][4].…”
Section: Introductionmentioning
confidence: 99%