Quantum Cryptography and Encryption

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Computational and Applied Mathematics".

Deadline for manuscript submissions: 30 April 2024 | Viewed by 3008

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyberspace Science, Faculty of Computing, Harbin Institute of Technology, Harbin 150080, China
Interests: quantum cryptography; quantum key distribution; discrete variable; information processing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, Peking University, Beijing 100871, China
2. Center for Quantum Information Technology, Peking University, Beijing 100871, China
Interests: quantum key distribution; quantum random number generation; quantum information theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Quantum cryptography and encryption is one of most popular research domains in recent decades. Researchers from multiple disciplines, such as physics, mathematics, computer science, electronics, etc., have worked together to bring up fruitful achievements. Nowadays, theoretical and experimental efforts are focused in many directions: extending the maximum distance of key distribution, increasing the final key rate in terms of both photonic layer and post-processing layer, developing new protocols suitable for a future quantum network, etc.

The purpose of this Special Issue is to gather a collection of articles reflecting the latest developments of quantum cryptography theories and applications. We invite researchers to submit their theoretical or experimental contributions on topics including, but not limited to: quantum key distribution, quantum networking, quantum direct communication, quantum hacking and countermeasure, and quantum random number generation.

Prof. Dr. Qiong Li
Dr. Ziyang Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum key distribution
  • quantum networking
  • quantum direct communication
  • quantum hacking and countermeasure
  • quantum random number generation
  • quantum encryption algorithm
  • quantum secret sharing
  • post quantum cryptography

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 585 KiB  
Article
A Remote Quantum Error-Correcting Code Preparation Protocol on Cluster States
by Qiang Zhao, Haokun Mao, Yucheng Qiao, Ahmed A. Abd El-Latif and Qiong Li
Mathematics 2023, 11(14), 3035; https://doi.org/10.3390/math11143035 - 08 Jul 2023
Viewed by 1007
Abstract
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol [...] Read more.
The blind quantum computation (BQC) protocol allows for privacy-preserving remote quantum computations. In this paper, we introduce a remote quantum error correction code preparation protocol for BQC using a cluster state and analyze its blindness in the measurement-based quantum computation model. Our protocol requires fewer quantum resources than previous methods, as it only needs weak coherent pulses, eliminating the need for quantum memory and limited quantum computing. The results of our theoretical analysis and simulations show that our protocol requires fewer quantum resources compared to non-coding methods with the same qubit error rate. Full article
(This article belongs to the Special Issue Quantum Cryptography and Encryption)
Show Figures

Figure 1

8 pages, 1100 KiB  
Article
Adaptive Continuous-Variable Quantum Key Distribution with Discrete Modulation Regulative in Free Space
by Yiwu Zhu, Lei Mao, Hui Hu, Yijun Wang and Ying Guo
Mathematics 2022, 10(23), 4450; https://doi.org/10.3390/math10234450 - 25 Nov 2022
Cited by 3 | Viewed by 980
Abstract
The finite sampling bandwidth of an analog-to-digital converter has a negative effect on the continuous-variable quantum key distribution (CVQKD), which leaves a potential loophole for an eavesdropper and weakens the practical security of the system. To compensate for the loss in free space, [...] Read more.
The finite sampling bandwidth of an analog-to-digital converter has a negative effect on the continuous-variable quantum key distribution (CVQKD), which leaves a potential loophole for an eavesdropper and weakens the practical security of the system. To compensate for the loss in free space, we deploy an adaptive optics (AO) unit in the detector of the CVQKD system with discrete modulations. Since the closed-loop control bandwidth of the embedded AO unit can be optimized with the sampling frequency, the practical security of the system can be enhanced in terms of the secret key rate. The security analysis is demonstrated on the basis of the derived secret key rate with numerical simulations, providing a feasible implementation of CVQKD in realistic free-space environments. Full article
(This article belongs to the Special Issue Quantum Cryptography and Encryption)
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Hundred-Femtosecond-Level Time Difference Measurement System Based on Linear Optical Sampling
Authors: Ziyang Chen
Affiliation: State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China

Title: Deep neural network based error correction for continous-variable quantum key distribution
Authors: Xiangyu Wang
Affiliation: State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China

Title: An Information-Theoretical Secure Authentication Scheme for Quantum Key Distribution Network
Authors: Yi Luo
Affiliation: "Faclty of Computing, Harbin Institute of Technology, Harbin 150001, China"

Title: Statistical analysis of twin-field type protocol in quantum key distribution with an untrusted source
Authors: Yuchen Qiao
Affiliation: "Guangxi Key Lab Cryptography& Information Security, Guilin University of Electronic Technology, Guilin 541004, Guangxi, China"

Back to TopTop