entropy-logo

Journal Browser

Journal Browser

Practical Quantum Communication II

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Quantum Information".

Deadline for manuscript submissions: closed (20 July 2023) | Viewed by 4710

Special Issue Editors


E-Mail Website
Guest Editor
Department of Physics, Tsinghua University, Beijing 100084, China
Interests: quantum information; quantum communication; quantum key distribution; quantum cryptography
Special Issues, Collections and Topics in MDPI journals
Jinan Institute of Quantum Technology, Jinan 250101, China
Interests: quantum communication; quantum key distribution; quantum cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Centre for Quantum Technologies, National University of Singapore, Singapore 117543, Singapore
Interests: quantum information science
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Quantum key distribution provides information-theoretic secure private communication between two remote parties.

In recent years, there has been active research and study into both the theoretical and experimental aspects of quantum key distribution, with an increasing emphasis on practical application, specifically towards better performance with higher security under realistic conditions.

This is the second Special Issue on this topic. Like the last Issue, the purpose of this second Special Issue concerns the integration of relevant theory and technology in quantum communication targeting a higher practical security level. We hope that this sharing will improve the performance of quantum secure communication protocols with higher efficiency over a longer secure distance. For this second Issue, we also hope to extend the topic to post-quantum cryptography. The topics to be addressed in this Special Issue include but are not limited to the following:

  • Theoretical and experimental studies in quantum key distribution (QKD);
  • Quantum communication technology;
  • Quantum security beyond QKD;
  • Post-quantum cryptography.

Prof. Dr. Xiang-Bin Wang
Dr. Cong Jiang
Prof. Dr. Leong Chuan Kwek
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security of QKD with imperfect device decoy-state method
  • homomorphic encryption
  • quantum oblivious transfer
  • discrete variable QKD
  • continuous variable QKD
  • quantum digital signature
  • quantum fingerprinting
  • quantum entanglement
  • quantum random number generation
  • quantum state manipulation
  • quantum memory

Related Special Issue

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 2604 KiB  
Article
APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking
by Liquan Chen, Ziyan Zhang, Mengnan Zhao, Kunliang Yu and Suhui Liu
Entropy 2022, 24(11), 1519; https://doi.org/10.3390/e24111519 - 24 Oct 2022
Cited by 3 | Viewed by 1393
Abstract
As the foundation of quantum secure communication, the quantum key distribution (QKD) network is impossible to construct by using the operation mechanism of traditional networks. In the meantime, most of the existing QKD network routing schemes do not fit some specific quantum key [...] Read more.
As the foundation of quantum secure communication, the quantum key distribution (QKD) network is impossible to construct by using the operation mechanism of traditional networks. In the meantime, most of the existing QKD network routing schemes do not fit some specific quantum key practicality scenarios. Aiming at the special scenario of high concurrency and large differences in application requirements, we propose a new quantum key distribution network routing scheme based on application priority ranking (APR-QKDN). Firstly, the proposed APR-QKDN scheme comprehensively uses the application’s priority, the total amount of key requirements, and the key update rate for prioritizing a large number of concurrent requests. The resource utilization and service efficiency of the network are improved by adjusting the processing order of requests. Secondly, the queuing strategy of the request comprehensively considers the current network resource situation. This means the same key request may adopt different evaluation strategies based on different network resource environments. Finally, the performance of the APR-QKDN routing scheme is compared with the existing schemes through simulation experiments. The results show that the success rate of application key requests of the APR-QKDN routing scheme is improved by at least 5% in the scenario of high concurrency. Full article
(This article belongs to the Special Issue Practical Quantum Communication II)
Show Figures

Figure 1

16 pages, 1083 KiB  
Article
Multi-Party Quantum Secret Sharing Based on GHZ State
by Zhihui Li, Xue Jiang and Lu Liu
Entropy 2022, 24(10), 1433; https://doi.org/10.3390/e24101433 - 08 Oct 2022
Cited by 3 | Viewed by 1496
Abstract
In this paper, we propose an efficient multi-party quantum secret sharing scheme based on GHZ entangled state. The participants in this scheme are divided into two groups, and share secrets as a group. There is no need to exchange any measurement information between [...] Read more.
In this paper, we propose an efficient multi-party quantum secret sharing scheme based on GHZ entangled state. The participants in this scheme are divided into two groups, and share secrets as a group. There is no need to exchange any measurement information between the two groups, reducing the security problems caused by the communication process. Each participant holds one particle from each GHZ state; it can be found that the particles of each GHZ state are related after measuring them, and the eavesdropping detection can detect external attacks based on this characteristic. Furthermore, since the participants within the two groups encode the measured particles, they can recover the same secrets. Security analysis shows that the protocol can resist the intercept-and-resend attack and entanglement measurement attack, and the simulation results show that the probability of an external attacker being detected is proportional to the amount of information he can obtain. Compared with the existing protocols, this proposed protocol is more secure, has less quantum resources and is more practical. Full article
(This article belongs to the Special Issue Practical Quantum Communication II)
Show Figures

Figure 1

16 pages, 920 KiB  
Article
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
by Xiao-Lei Jiang, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Chun Zhou and Wan-Su Bao
Entropy 2022, 24(10), 1339; https://doi.org/10.3390/e24101339 - 23 Sep 2022
Cited by 1 | Viewed by 1246
Abstract
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution. However, the weak randomness in a practical QKD system may lower [...] Read more.
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution. However, the weak randomness in a practical QKD system may lower the secret key rate and limit its achievable communication distance, thus compromising its performance. In this paper, we analyze the effects of the weak randomness on the SNS TF-QKD. The numerical simulation shows that SNS TF-QKD can still have an excellent performance under the weak random condition: the secret key rate can exceed the PLOB boundary and achieve long transmission distances. Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). Our results emphasize that keeping the randomness of the states is significant to the protection of state preparation devices. Full article
(This article belongs to the Special Issue Practical Quantum Communication II)
Show Figures

Figure 1

Back to TopTop