Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...
Հիմնական հեղինակներ: | , , , , , , , , , , , , , , |
---|---|
Ձևաչափ: | Journal article |
Լեզու: | English |
Հրապարակվել է: |
Springer Nature
2022
|