Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper.
A new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online, by integrating quantum cryptography in TLS protocol is introduced.
Nobuyuki Imoto
Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464)
A theory on quantum key distribution (QKD) with coherent states and a theory on two-state QKD with noisy light sources are developed.
Encryption, in this context, ensures that only the intended sender and receiver can understand any message being sent over an Internet channel.
N. Gisin, G. Ribordy, Wolfgang Tittel + 1 more
journal unavailable
The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
There is no abstract for this review article.
Mustafa Toyran
2007 IEEE 15th Signal Processing and Communications Applications
The definition of classical and quantum cryptography is given and the difference between the two is emphasized and the famous quantum key distribution example is presented.
References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains considerable material on classical cryptography H. K. Lo and N. Lutkenhaus, ”Quantum cryptography: from theory to practice,” (2007). arXiv:quant-ph/0702202. A short and very readable introduction. H. K....
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
Hoi-Kwong Lo, Yi Zhao
2009 International Conference and Seminar on Micro/Nanotechnologies and Electron Devices
The work presents results of experiments conducted on the developed setup based on single photon polarization coding, and describes developed fiber based quantum cryptography working with the telecom wavelength 1555 nm.
The theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link are described.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
This review article discusses the traditional application of quantum cryptography, quantum key distribution (QKD), from a modern perspective, and discusses some recent developments in the context of quantum two-party cooperation (2PC).
Nowadays, information is exchanged among the computer network. These data and information are involved in the business, military, academic education, research and etc. which are shared around the world in both private and public networks. Since, many categories of data are required restriction on the authorization of access, modify, delete, and insert, security in communication is increasingly important to network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use a security attack with a ...
S. Lakshmi, S. Krishnamoorthy, Mudassir Khan + 2 more
Limitations and Future Applications of Quantum Cryptography
This paper discusses quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding, which is used to establish communication by generating cryptographic keys.
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas and quantum key distribution is considered as the third and final insight to transform cryptography in the 20th century.
This is a chapter on quantum cryptography for the book"A Multidisciplinary Introduction to Information Security"to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin + 1 more
Applied Physics B
After a short introduction to classic cryptography we explain thoroughly how quantum cryptography works. We present then an elegant experimental realization based on a self-balanced interferometer with Faraday mirrors. This phase-coding setup needs no alignment of the interferometer nor polarization control, and therefore considerably facilitates the experiment. Moreover it features excellent fringe visibility. Next, we estimate the practical limits of quantum cryptography. The importance of the detector noise is illustrated and means of reducing it are presented. With present-day technologies...
Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper.
An idea of Stephen Wiesner is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics and it appears that this scheme could actually be implemented in favorable environments.