Quantum Communication III – Tutorial for IT Specialists Part 3 (Dr. Peter Holleczek) / german language

Symbolic picture for the article. The link opens the image in a large view.

Topic: Quantum Communication III – Key generation

Since repeating in quantum networks is not ready for operation anytime soon, a more modest approach is needed for network construction. The remedy is smaller-scale and more tightly meshed networks in the 100km range. This places higher demands on security and performance, especially for key generation. The tutorial shows what progress has been made since the original BB84 protocol and what role time bin coding plays. The state spaces known in computer science will also be discussed.

The link and password have remained the same.

Dr. Peter Holleczek

https://www.fau.tv/course/id/2594

Passwort: TuQUANKOMM-WiSe2021

all parts

other sources

[BPG99] Bechmann-Pasquinucci H., Gisin N.
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
https://arxiv.org/pdf/quant-ph/9807041

[BBM95] Bennett C. H., Brassard G., Mermin N. D.
Quantum cryptography without Bell‘s theorem

[Bea91] Bennett C. H.
Experimental Quantum Cryptography
http://cs.uccs.edu/~cs691/crypto/BBBSS92.pdf

[BB84] Bennett C. H., Brassard G.
Quantum cryptography: Public key distribution and coin tossing

[Bea18] Boaron A., Boso G., Rusca D., et al.
Secure Quantum Key Distribution over 421 km of Optical Fiber

[Bea18-1] Boaron A., Korzh B., Houlmann R., et al.
Simple 2.5 GHz time-bin quantum key distribution
https://arxiv.org/pdf/1804.05426

[CS09] Cai R. Y. Q., Scarani V.
Finite-key analysis for practical implementations of quantum key distribution
https://arxiv.org/pdf/0811.2628

[E91] Ekert A. K.
Quantum cryptography based on Bell‘s theorem
https://cqi.inf.usi.ch/qic/91_Ekert.pdf

[Iea17] Islam N. T., Lim C. Ci Wen, Cahall C., et al.
Provably secure and high-rate quantum key distribution with time-bin qudits
https://arxiv.org/pdf/1709.06135

[Lea13] Lucamarini M., Patel K. A., Dynes J. F., et al.
Efficient decoy-state quantum key distribution with quantified security
https://arxiv.org/pdf/1310.0240

[NJea13] Nisbet-Jones P. B. R., Dilley J., Holleczek A., et al.
Photonic qubits, qutrits and ququads accurately prepared and delivered on demand
https://iopscience.iop.org/article/10.1088/1367-2630/15/5/053007

[SARG04] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
https://arxiv.org/pdf/quant-ph/0211131

[SR08] Scarani V., Acín A., Ribordy G., et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations

[Vea20] Vagniluca I., Da Lio B., Rusca D., et al.
Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution
https://arxiv.org/pdf/2004.03498

[Vea15] Versteegh M. A. M., Reimer M. E., van den Berg A. A., et al.
Single pairs of time-bin-entangled photons
https://arxiv.org/pdf/1507.01876

 

https://www.cisco.com/c/en/us/products/collateral/optical-networking/solution-overview-c22-743948.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2021/m12/hold-liz.html

https://gblogs.cisco.com/de/zero-trust-mit-quanten-wie-kann-qkd-quantum-key-distribution-teil-einer-zero-trust-strategie-werden/

https://quantumxc.com/press-release/quantum-xchange-completes-integration-with-cisco-to-enable-quantum-safe-networking-equipment-with-no-key-delivery-limitations/

http://www.quantum-info.com/English/