entropy-logo

Journal Browser

Journal Browser

Quantum Cryptography II

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Quantum Information".

Deadline for manuscript submissions: closed (31 May 2021) | Viewed by 9645

Special Issue Editors

Department of Physics and Astronomy, The University of Sheffield, Sheffield S3 7RH, UK
Interests: quantum information theory; quantum cryptography; quantum imaging
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Physics, The University of York, York YO10 5DD, UK
Interests: experimental quantum cryptography; QKD networks; free-space quantum communications; security of QKD implementations

E-Mail Website
Guest Editor
Consiglio Nazionale delle Ricerche – Istituto Nazionale di Ottica (CNR-INO), Sesto Fiorentino, I-50019 Firenze, Italy
Interests: field trial of quantum key distribution; experimental quantum key distribution; quantum communications; quantum state engineering

Special Issue Information

Dear Colleagues,

The last three decades have seen quantum cryptography growing into a well-established and mature research field. Recent breakthroughs in quantum computation and the beginning of the quantum space race have highlighted the strategic importance of quantum cryptography.

The goal of this special issue is to provide an open forum to discuss advanced problems in quantum cryptography, from fundamental concepts to technological advances and experimental challenges.

We invite contribution of research and review papers on a broad range of topics, including but not limited to discrete and continuous-variable quantum key distribution, twin-field, device-independent, and measurement-device-independent quantum key distribution, attacks and countermeasures in quantum key distribution, quantum sources and detectors, quantum networks, quantum repeaters, random number generation, homomorphic encryption, and two-party cryptography.

Dr. Cosmo Lupo
Dr. Rupesh Kumar
Dr. Alessandro Zavatta
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum cryptography
  • quantum key distribution
  • continuous variables
  • twin-field quantum key distribution
  • device-independent quantum key distribution
  • measurement-device-independent quantum key distribution
  • quantum networks
  • quantum internet
  • quantum repeaters
  • random number generation
  • homomorphic encryption
  • two-party quantum cryptography

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 1224 KiB  
Article
Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
by Yiming Bian, Luyu Huang and Yichen Zhang
Entropy 2021, 23(3), 294; https://doi.org/10.3390/e23030294 - 27 Feb 2021
Cited by 1 | Viewed by 2026
Abstract
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general [...] Read more.
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect. Full article
(This article belongs to the Special Issue Quantum Cryptography II)
Show Figures

Figure 1

13 pages, 293 KiB  
Article
Non-Invertible Public Key Certificates
by Luis Adrián Lizama-Perez and J. Mauricio López R.
Entropy 2021, 23(2), 226; https://doi.org/10.3390/e23020226 - 12 Feb 2021
Cited by 3 | Viewed by 1866
Abstract
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to implement a secure, scalable, interoperable and [...] Read more.
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to implement a secure, scalable, interoperable and efficient public key infrastructure (PKI). We show functionality of certificates across different certification domains. Finally, we discuss a method that enables non-invertible certificates to exhibit perfect forward secrecy (PFS). Full article
(This article belongs to the Special Issue Quantum Cryptography II)
Show Figures

Figure 1

14 pages, 649 KiB  
Article
Applicability of Squeezed- and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links
by Ivan Derkach and Vladyslav C. Usenko
Entropy 2021, 23(1), 55; https://doi.org/10.3390/e23010055 - 31 Dec 2020
Cited by 12 | Viewed by 2496
Abstract
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links, considering low Earth orbits and taking into account strong varying channel attenuation, atmospheric turbulence and finite data ensemble size effects. We obtain tight security bounds [...] Read more.
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links, considering low Earth orbits and taking into account strong varying channel attenuation, atmospheric turbulence and finite data ensemble size effects. We obtain tight security bounds on the untrusted excess noise on the channel output, which suggest that substantial efforts aimed at setup stabilization and reduction of noise and loss are required, or the protocols can be realistically implemented over satellite links once either individual or passive collective attacks are assumed. Furthermore, splitting the satellite pass into discrete segments and extracting the key from each rather than from the overall single pass allows one to effectively improve robustness against the untrusted channel noise and establish a secure key under active collective attacks. We show that feasible amounts of optimized signal squeezing can substantially improve the applicability of the protocols allowing for lower system clock rates and aperture sizes and resulting in higher robustness against channel attenuation and noise compared to the coherent-state protocol. Full article
(This article belongs to the Special Issue Quantum Cryptography II)
Show Figures

Figure 1

13 pages, 1376 KiB  
Article
Deterministic Secure Quantum Communication on the BB84 System
by Youn-Chang Jeong, Se-Wan Ji, Changho Hong, Hee Su Park and Jingak Jang
Entropy 2020, 22(11), 1268; https://doi.org/10.3390/e22111268 - 7 Nov 2020
Cited by 9 | Viewed by 2596
Abstract
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. [...] Read more.
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment. Full article
(This article belongs to the Special Issue Quantum Cryptography II)
Show Figures

Figure 1

Back to TopTop