Quantum information and computation - Charles H. Bennett , David P. DiVincenzo
Quantum Key Distribution
Factors preventing wide adoption of quantum key distribution outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols. However, with optic fibre networks already present in many countries the infrastructure is in place for a more widespread use.
How to improve cybersecurity through quantum technology ?
A quantum internet supports numerous applications, enabled by quantum entanglement. In general, quantum entanglement is well suited for tasks that require coordination, synchronization or privacy.
Examples of such applications include quantum key distribution, clock synchronization, protocols for distributed system problems such as leader election or byzantine agreement, extending the baseline of telescopes, as well as position verification, secure identification and two-party cryptography in the noisy-storage model. A quantum internet also enables secure access to a quantum computer in the cloud.
Milestone Experiment Proves Quantum Communication Really Is Faster
In a Paris lab, researchers have shown for the first time that quantum methods of transmitting information are superior to classical ones.
Local and Distributed Quantum Computation -- when does Distributed QC make sense?
Rodney Van Meter and Simon J. Devitt
KETS LEADING THE QUANTUM SECURITY REVOLUTION WITH QUANTUM KEY DISTRIBUTION
Quantum Technology Promises Practical Cryptography With Unbreakable Keys
- Whitepaper - Quantum key distribution from National Security Council in UK
explores the limitations of QKD systems, including security concerns
makes the case for research into developing post-quantum public key cryptography as a more practical and cost-effective step towards defending real-world communications systems from the threat of a future quantum computer