Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...
Главные авторы: | Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D |
---|---|
Формат: | Journal article |
Язык: | English |
Опубликовано: |
Springer Nature
2022
|
Схожие документы
-
An elementary quantum network of entangled optical atomic clocks
по: Nichol, BC, и др.
Опубликовано: (2022) -
Robust quantum memory in a trapped-ion quantum network node
по: Drmota, P, и др.
Опубликовано: (2022) -
Verifiable blind quantum computing with trapped ions and single photons
по: Drmota, P, и др.
Опубликовано: (2024) -
Distributed quantum computing across an optical network link
по: Main, D, и др.
Опубликовано: (2025) -
Robust quantum memory in a trapped-ion quantum network node
по: Drmota, P, и др.
Опубликовано: (2023)