Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...
Main Authors: | Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D |
---|---|
Formato: | Journal article |
Idioma: | English |
Publicado: |
Springer Nature
2022
|
Títulos similares
Títulos similares
-
An elementary quantum network of entangled optical atomic clocks
por: Nichol, BC, et al.
Publicado: (2022) -
Robust quantum memory in a trapped-ion quantum network node
por: Drmota, P, et al.
Publicado: (2022) -
Verifiable blind quantum computing with trapped ions and single photons
por: Drmota, P, et al.
Publicado: (2024) -
Distributed quantum computing across an optical network link
por: Main, D, et al.
Publicado: (2025) -
Robust quantum memory in a trapped-ion quantum network node
por: Drmota, P, et al.
Publicado: (2023)