Quantum Communication III – Tutorial for IT Specialists Part 3 (Dr. Peter Holleczek) / german language
Quantum Communication III - Key generation
Since repeating in quantum networks is not ready for operation anytime soon, a more modest approach is needed for network construction. The remedy is smaller-scale and more tightly meshed networks in the 100 km range. This places higher demands on security and performance, especially for key generation. In the third part (videos 21-27) the tutorial shows what progress has been made since the original BB84 protocol and what role time bin endcoding plays. The state spaces known in computer science will also be discussed.
The link and password have remained the same.
Dr. Peter Holleczek
https://www.fau.tv/course/id/2594
all parts
other sources:
[BPG99] H. Bechmann-Pasquinucci, N. Gisin
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
https://arxiv.org/pdf/quant-ph/9807041
[BBM95] C. H. Bennett et al.
Quantum cryptography without Bell‘s theorem
[Bea91] C. H. Bennett et al.
Experimental Quantum Cryptography
http://cs.uccs.edu/~cs691/crypto/BBBSS92.pdf
[BB84] C. H. Bennett, G. Brassard
Quantum cryptography: Public key distribution and coin tossing
[Bea18] A. Boaron et al.
Secure Quantum Key Distribution over 421 km of Optical Fiber
[Bea18-1] A. Boaron et al.
Simple 2.5 GHz time-bin quantum key distribution
https://arxiv.org/pdf/1804.05426
[CS09] R. Y. Q. Cai, V. Scarani
Finite-key analysis for practical implementations of quantum key distribution
https://arxiv.org/pdf/0811.2628
[E91] A. K. Ekert
Quantum cryptography based on Bell‘s theorem
https://cqi.inf.usi.ch/qic/91_Ekert.pdf
[Iea17] N. T. Islam et al.
Provably secure and high-rate quantum key distribution with time-bin qudits
https://arxiv.org/pdf/1709.06135
[Lea13] M. Lucamarini et al.
Efficient decoy-state quantum key distribution with quantified security
https://arxiv.org/pdf/1310.0240
[NJea13] P. B. R. Nisbet-Jones et al.
Photonic qubits, qutrits and ququads accurately prepared and delivered on demand
https://iopscience.iop.org/article/10.1088/1367-2630/15/5/053007
[SARG04] V. Scarani et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
https://arxiv.org/pdf/quant-ph/0211131
[SR08] V. Scarani et al.
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
[Vea20] I. Vagniluca et al.
Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution
https://arxiv.org/pdf/2004.03498
[Vea15] M. A. M. Versteegh et al.
Single pairs of time-bin-entangled photons
https://arxiv.org/pdf/1507.01876
cisco
Post Quantum Security Brief
https://www.cisco.com/c/en/us/products/collateral/optical-networking/solution-overview-c22-743948.html
cisco
Technology predictions: Speed of innovation will drive even more opportunities and challenges
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2021/m12/hold-liz.html
cisco
Zero Trust mit Quanten – Wie kann QKD (Quantum Key Distribution) Teil einer Zero Trust Strategie werden?
https://gblogs.cisco.com/de/zero-trust-mit-quanten-wie-kann-qkd-quantum-key-distribution-teil-einer-zero-trust-strategie-werden/
quantumxchange
Quantum Xchange Completes Integration with Cisco to Enable Quantum-Safe Networking Equipment with No Key Delivery Limitations
https://quantumxc.com/press-release/quantum-xchange-completes-integration-with-cisco-to-enable-quantum-safe-networking-equipment-with-no-key-delivery-limitations/