Quantum Communication III – Tutorial for IT Specialists Part 3 (Dr. Peter Holleczek) / german language
Topic: Quantum Communication III – Key generation
Since repeating in quantum networks is not ready for operation anytime soon, a more modest approach is needed for network construction. The remedy is smaller-scale and more tightly meshed networks in the 100km range. This places higher demands on security and performance, especially for key generation. The tutorial shows what progress has been made since the original BB84 protocol and what role time bin coding plays. The state spaces known in computer science will also be discussed.
The link and password have remained the same.
Dr. Peter Holleczek
https://www.fau.tv/course/id/2594
all parts
other sources
[BPG99] Bechmann-Pasquinucci H., Gisin N.
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
https://arxiv.org/pdf/quant-ph/9807041
[BBM95] Bennett C. H., Brassard G., Mermin N. D.
Quantum cryptography without Bell‘s theorem
[Bea91] Bennett C. H.
Experimental Quantum Cryptography
http://cs.uccs.edu/~cs691/crypto/BBBSS92.pdf
[BB84] Bennett C. H., Brassard G.
Quantum cryptography: Public key distribution and coin tossing
[Bea18] Boaron A., Boso G., Rusca D., et al.
Secure Quantum Key Distribution over 421 km of Optical Fiber
[Bea18-1] Boaron A., Korzh B., Houlmann R., et al.
Simple 2.5 GHz time-bin quantum key distribution
https://arxiv.org/pdf/1804.05426
[CS09] Cai R. Y. Q., Scarani V.
Finite-key analysis for practical implementations of quantum key distribution
https://arxiv.org/pdf/0811.2628
[E91] Ekert A. K.
Quantum cryptography based on Bell‘s theorem
https://cqi.inf.usi.ch/qic/91_Ekert.pdf
[Iea17] Islam N. T., Lim C. Ci Wen, Cahall C., et al.
Provably secure and high-rate quantum key distribution with time-bin qudits
https://arxiv.org/pdf/1709.06135
[Lea13] Lucamarini M., Patel K. A., Dynes J. F., et al.
Efficient decoy-state quantum key distribution with quantified security
https://arxiv.org/pdf/1310.0240
[NJea13] Nisbet-Jones P. B. R., Dilley J., Holleczek A., et al.
Photonic qubits, qutrits and ququads accurately prepared and delivered on demand
https://iopscience.iop.org/article/10.1088/1367-2630/15/5/053007
[SARG04] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
https://arxiv.org/pdf/quant-ph/0211131
[SR08] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
[Vea20] Vagniluca I., Da Lio B., Rusca D., et al.
Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution
https://arxiv.org/pdf/2004.03498
[Vea15] Versteegh M. A. M., Reimer M. E., van den Berg A. A., et al.
Single pairs of time-bin-entangled photons
https://arxiv.org/pdf/1507.01876
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2021/m12/hold-liz.html
http://www.quantum-info.com/English/