Quantum Communication III – Tutorial for IT Specialists Part 3 (Dr. Peter Holleczek) / german language

Symbolic picture for the article. The link opens the image in a large view.

Topic: Quantum Communication III – Key generation

Since repeating in quantum networks is not ready for operation anytime soon, a more modest approach is needed for network construction. The remedy is smaller-scale and more tightly meshed networks in the 100km range. This places higher demands on security and performance, especially for key generation. The tutorial shows what progress has been made since the original BB84 protocol and what role time bin coding plays. The state spaces known in computer science will also be discussed.

The link and password have remained the same.

Dr. Peter Holleczek


Passwort: TuQUANKOMM-WiSe2021

all parts

other sources

[BPG99] Bechmann-Pasquinucci H., Gisin N.
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography

[BBM95] Bennett C. H., Brassard G., Mermin N. D.
Quantum cryptography without Bell‘s theorem

[Bea91] Bennett C. H.
Experimental Quantum Cryptography

[BB84] Bennett C. H., Brassard G.
Quantum cryptography: Public key distribution and coin tossing

[Bea18] Boaron A., Boso G., Rusca D., et al.
Secure Quantum Key Distribution over 421 km of Optical Fiber

[Bea18-1] Boaron A., Korzh B., Houlmann R., et al.
Simple 2.5 GHz time-bin quantum key distribution

[CS09] Cai R. Y. Q., Scarani V.
Finite-key analysis for practical implementations of quantum key distribution

[E91] Ekert A. K.
Quantum cryptography based on Bell‘s theorem

[Iea17] Islam N. T., Lim C. Ci Wen, Cahall C., et al.
Provably secure and high-rate quantum key distribution with time-bin qudits

[Lea13] Lucamarini M., Patel K. A., Dynes J. F., et al.
Efficient decoy-state quantum key distribution with quantified security

[NJea13] Nisbet-Jones P. B. R., Dilley J., Holleczek A., et al.
Photonic qubits, qutrits and ququads accurately prepared and delivered on demand

[SARG04] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations

[SR08] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations

[Vea20] Vagniluca I., Da Lio B., Rusca D., et al.
Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution

[Vea15] Versteegh M. A. M., Reimer M. E., van den Berg A. A., et al.
Single pairs of time-bin-entangled photons