Quantum key distribution with hacking countermeasures and long term field trial
Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical m...
Saved in:
Main Authors: | A. R. Dixon, J. F. Dynes, M. Lucamarini, B. Fröhlich, A. W. Sharpe, A. Plews, W. Tam, Z. L. Yuan, Y. Tanizawa, H. Sato, S. Kawamura, M. Fujiwara, M. Sasaki, A. J. Shields |
---|---|
Format: | article |
Language: | EN |
Published: |
Nature Portfolio
2017
|
Subjects: | |
Online Access: | https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Experimental measurement-device-independent quantum digital signatures
by: G. L. Roberts, et al.
Published: (2017) -
Gigahertz measurement-device-independent quantum key distribution using directly modulated lasers
by: R. I. Woodward, et al.
Published: (2021) -
Strategy for Data: Open it or Hack it?
by: Herala,Antti, et al.
Published: (2019) -
Chip-based quantum key distribution
by: P. Sibson, et al.
Published: (2017) -
An Exploration of the Psychological Impact of Hacking Victimization
by: Alexa Palassis, et al.
Published: (2021)