Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...
المؤلفون الرئيسيون: | Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D |
---|---|
التنسيق: | Journal article |
اللغة: | English |
منشور في: |
Springer Nature
2022
|
مواد مشابهة
-
An elementary quantum network of entangled optical atomic clocks
حسب: Nichol, BC, وآخرون
منشور في: (2022) -
Robust quantum memory in a trapped-ion quantum network node
حسب: Drmota, P, وآخرون
منشور في: (2022) -
Verifiable blind quantum computing with trapped ions and single photons
حسب: Drmota, P, وآخرون
منشور في: (2024) -
Distributed quantum computing across an optical network link
حسب: Main, D, وآخرون
منشور في: (2025) -
Robust quantum memory in a trapped-ion quantum network node
حسب: Drmota, P, وآخرون
منشور في: (2023)