Quantum key distribution and cryptography: a survey

Authors Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Slavail, Michel Riguidel, Andrew Shilds, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John Rarity, Harald Weinfurter, Anton Zeilinger, Christian Monyk



PDF
Thumbnail PDF

File

DagSemProc.09311.3.pdf
  • Filesize: 0.51 MB
  • 29 pages

Document Identifiers

Author Details

Romain Alléaume
Norbert Lütkenhaus
Renato Renner
Philippe Grangier
Thierry Debuisschert
Gregoire Ribordy
Nicolas Gisin
Philippe Painchault
Thomas Pornin
Louis Slavail
Michel Riguidel
Andrew Shilds
Thomas Länger
Momtchil Peev
Mehrdad Dianati
Anthony Leverrier
Andreas Poppe
Jan Bouda
Cyril Branciard
Mark Godfrey
John Rarity
Harald Weinfurter
Anton Zeilinger
Christian Monyk

Cite AsGet BibTex

Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Slavail, Michel Riguidel, Andrew Shilds, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John Rarity, Harald Weinfurter, Anton Zeilinger, and Christian Monyk. Quantum key distribution and cryptography: a survey. In Classical and Quantum Information Assurance Foundations and Practice. Dagstuhl Seminar Proceedings, Volume 9311, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
https://doi.org/10.4230/DagSemProc.09311.3

Abstract

I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ? I will in particular cover the following topics - practical performances of QKD - QKD network deployment - SECOQC project - Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements - Quantum information and Side-channels - QKD security assurance - Thoughts about "real" Post-Quantum Cryptography
Keywords
  • QKD
  • QKD networks
  • Security assurance
  • Post-Quantum Cryptography

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail