Quantum Cryptography and Encryption

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Computational and Applied Mathematics".

Deadline for manuscript submissions: closed (30 April 2024) | Viewed by 3470

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyberspace Science, Faculty of Computing, Harbin Institute of Technology, Harbin 150080, China
Interests: quantum cryptography; quantum key distribution; discrete variable; information processing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, Peking University, Beijing 100871, China
2. Center for Quantum Information Technology, Peking University, Beijing 100871, China
Interests: quantum key distribution; quantum random number generation; quantum information theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Quantum cryptography and encryption is one of most popular research domains in recent decades. Researchers from multiple disciplines, such as physics, mathematics, computer science, electronics, etc., have worked together to bring up fruitful achievements. Nowadays, theoretical and experimental efforts are focused in many directions: extending the maximum distance of key distribution, increasing the final key rate in terms of both photonic layer and post-processing layer, developing new protocols suitable for a future quantum network, etc.

The purpose of this Special Issue is to gather a collection of articles reflecting the latest developments of quantum cryptography theories and applications. We invite researchers to submit their theoretical or experimental contributions on topics including, but not limited to: quantum key distribution, quantum networking, quantum direct communication, quantum hacking and countermeasure, and quantum random number generation.

Prof. Dr. Qiong Li
Dr. Ziyang Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum key distribution
  • quantum networking
  • quantum direct communication
  • quantum hacking and countermeasure
  • quantum random number generation
  • quantum encryption algorithm
  • quantum secret sharing
  • post quantum cryptography

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

8 pages, 663 KiB  
Article
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
by Shengzhe Xu, Zicheng Zhou and Ying Guo
Mathematics 2024, 12(9), 1356; https://doi.org/10.3390/math12091356 - 29 Apr 2024
Viewed by 308
Abstract
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of [...] Read more.
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of the system. However, an imperfect amplitude modulator (AM) can give birth to a potential information leakage from the modulation of the transmitter. To reveal a potential security loophole from the high-frequency AM embedded in the transmitter, we demonstrate an influence on the practical security of the system in terms of the secret key rate and maximal transmission distance. The results indicate the risk of this security loophole in the imperfect AM-embedded transmitter. Fortunately, the legal participants can trace back the potential information leakage that has been produced from the imperfect transmitter at high frequencies, which can be used for defeating the leakage attack in CVQKD. We find the limitations of the imperfect AM-embedded transmitter of the high-frequency quantum system, and hence, we have to trade off the practical security and the modulation frequency of the AM-embedded transmitter while considering its implementation in a practical environment. Full article
(This article belongs to the Special Issue Quantum Cryptography and Encryption)
12 pages, 585 KiB  
Article
A Remote Quantum Error-Correcting Code Preparation Protocol on Cluster States
by Qiang Zhao, Haokun Mao, Yucheng Qiao, Ahmed A. Abd El-Latif and Qiong Li
Mathematics 2023, 11(14), 3035; https://doi.org/10.3390/math11143035 - 08 Jul 2023
Viewed by 1050
Abstract
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol [...] Read more.
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol requires fewer quantum resources than previous methods, as it only needs weak coherent pulses, eliminating the need for quantum memory and limited quantum computing. The results of our theoretical analysis and simulations show that our protocol requires fewer quantum resources compared to non-coding methods with the same qubit error rate. Full article
(This article belongs to the Special Issue Quantum Cryptography and Encryption)
Show Figures

Figure 1

8 pages, 1100 KiB  
Article
Adaptive Continuous-Variable Quantum Key Distribution with Discrete Modulation Regulative in Free Space
by Yiwu Zhu, Lei Mao, Hui Hu, Yijun Wang and Ying Guo
Mathematics 2022, 10(23), 4450; https://doi.org/10.3390/math10234450 - 25 Nov 2022
Cited by 3 | Viewed by 1014
Abstract
The finite sampling bandwidth of an analog-to-digital converter has a negative effect on the continuous-variable quantum key distribution (CVQKD), which leaves a potential loophole for an eavesdropper and weakens the practical security of the system. To compensate for the loss in free space, [...] Read more.
The finite sampling bandwidth of an analog-to-digital converter has a negative effect on the continuous-variable quantum key distribution (CVQKD), which leaves a potential loophole for an eavesdropper and weakens the practical security of the system. To compensate for the loss in free space, we deploy an adaptive optics (AO) unit in the detector of the CVQKD system with discrete modulations. Since the closed-loop control bandwidth of the embedded AO unit can be optimized with the sampling frequency, the practical security of the system can be enhanced in terms of the secret key rate. The security analysis is demonstrated on the basis of the derived secret key rate with numerical simulations, providing a feasible implementation of CVQKD in realistic free-space environments. Full article
(This article belongs to the Special Issue Quantum Cryptography and Encryption)
Show Figures

Figure 1

Back to TopTop