Narrow your search

Library

ULiège (7)

KU Leuven (5)

FARO (4)

LUCA School of Arts (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

VIVES (4)

Vlaams Parlement (4)

More...

Resource type

book (10)

dissertation (3)


Language

English (13)


Year
From To Submit

2024 (3)

2022 (3)

2021 (1)

2020 (5)

2018 (1)

Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Dissertation
Master thesis and internship[BR]- Master's thesis : Study and control of polarization in a ground-based quantum communication telescope[BR]- Internship
Authors: --- --- --- ---
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

The vulnerability of classical encryption protocols to the increasing power of quantum computers is driving research into new and secure methods of communication. One promising candidate to address this problematic is quantum key distribution, which takes advantage of the properties of quantum mechanics to ensure a secure exchange of the encryption key, thus guaranteeing secure communication between the entities.&#13;Quantum key exchange algorithms exploit the properties of quantum objects, typically the polar- ization of photons, to set up the secure exchange. To this end, the polarization state of the photons must be maintained throughout the exchange. Reflections of the telescope mirrors at the receiver, however, modify the polarization state.&#13;The present work recalls the concept of light polarization, and the different types with the as- sociated mathematical description. A general introduction to quantum key distribution, and to the MOCA project, then follows to introduce the reader to the main parts of this work, which focuses on characterizing the changes in polarization caused by the telescope, and in particular by the third mirror where the high angle of incidence causes polarization aberrations. Based on the Jones formalism, it is shown that the phase shift between the orthogonal components of the polarization at the wavelengths relevant to this project is too large to satisfy the requirements in terms of polarization extinction ratio.&#13;As a result of the unsatisfactory performance of the telescope, an in-depth study of the use of birefringent crystals to correct the excessive phase shift is carried out, showing the need to use three crystals of different birefringence to achieve the desired polarization extinction ratios at the three relevant wavelengths for MOCA. Results also show that if there is an order of priority for optimizing the wavelengths of the application, the use of one or two crystals proves to be worthwhile. Eventually, based on ellipsometric measurements, the phase shift and change in polarization orientation generated by a mirror of configuration comparable to the third mirror of the telescope are determined. A comparison of the results provided by models to real measurements confirms the implementation of the Jones formalism and highlights the need to characterize a mirror on the basis of experimental measurements.


Dissertation
Mémoire
Authors: --- --- --- ---
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis aims to present the various coding methods and applications related to quantum key distribution. Quantum key distribution enables unconditional security for data exchanges, and its development is therefore a crucial issue in our digital world.


Dissertation
Mémoire
Authors: --- --- --- --- --- et al.
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

In quantum cryptography, the first secure protocol to have been formalized is the BB84 protocol. In this master's thesis, we analyze its security under dissipation, weak measurements combined with artificial intelligence, and quantum feedback.


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Keywords

Technology: general issues --- History of engineering & technology --- continuous-variable quantum key distribution --- measurement device independent --- zero-photon catalysis --- underwater channel --- quantum key distribution (QKD) --- discrete variable (DV)-QKD --- continuous variable (CV)-QKD --- postquantum cryptography (PQC) --- quantum communications networks (QCNs) --- quantum communications --- entanglement --- surface codes --- quantum cryptography --- quantum key distribution --- quantum network --- measurement-device-independent --- mean-king’s problem --- mean multi-kings’ problem --- information disturbance theorem --- QKD --- distillation --- amplification --- reconciliation --- quantum identity authentication --- private equality tests --- conclusive exclusion --- single-photon mode --- synchronization --- algorithm --- detection probability --- vulnerability --- twin-field quantum key distribution --- phase-matching --- discrete phase randomization --- intrinsic bit error rate --- the Bernstein-Vazirani algorithm --- EPR pairs --- quantum entanglement --- quantum information theory --- geometrical optics restricted eavesdropping --- secret key distillation --- satellite-to-satellite --- physical layer security --- secret key generation --- injection attacks --- jamming attacks --- pilot randomization --- clock synchronization --- Bayesian statistics --- oblivious transfer --- post-quantum cryptography --- universal composability --- n/a --- mean-king's problem --- mean multi-kings' problem


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Keywords

Technology: general issues --- History of engineering & technology --- continuous-variable quantum key distribution --- measurement device independent --- zero-photon catalysis --- underwater channel --- quantum key distribution (QKD) --- discrete variable (DV)-QKD --- continuous variable (CV)-QKD --- postquantum cryptography (PQC) --- quantum communications networks (QCNs) --- quantum communications --- entanglement --- surface codes --- quantum cryptography --- quantum key distribution --- quantum network --- measurement-device-independent --- mean-king's problem --- mean multi-kings' problem --- information disturbance theorem --- QKD --- distillation --- amplification --- reconciliation --- quantum identity authentication --- private equality tests --- conclusive exclusion --- single-photon mode --- synchronization --- algorithm --- detection probability --- vulnerability --- twin-field quantum key distribution --- phase-matching --- discrete phase randomization --- intrinsic bit error rate --- the Bernstein-Vazirani algorithm --- EPR pairs --- quantum entanglement --- quantum information theory --- geometrical optics restricted eavesdropping --- secret key distillation --- satellite-to-satellite --- physical layer security --- secret key generation --- injection attacks --- jamming attacks --- pilot randomization --- clock synchronization --- Bayesian statistics --- oblivious transfer --- post-quantum cryptography --- universal composability --- continuous-variable quantum key distribution --- measurement device independent --- zero-photon catalysis --- underwater channel --- quantum key distribution (QKD) --- discrete variable (DV)-QKD --- continuous variable (CV)-QKD --- postquantum cryptography (PQC) --- quantum communications networks (QCNs) --- quantum communications --- entanglement --- surface codes --- quantum cryptography --- quantum key distribution --- quantum network --- measurement-device-independent --- mean-king's problem --- mean multi-kings' problem --- information disturbance theorem --- QKD --- distillation --- amplification --- reconciliation --- quantum identity authentication --- private equality tests --- conclusive exclusion --- single-photon mode --- synchronization --- algorithm --- detection probability --- vulnerability --- twin-field quantum key distribution --- phase-matching --- discrete phase randomization --- intrinsic bit error rate --- the Bernstein-Vazirani algorithm --- EPR pairs --- quantum entanglement --- quantum information theory --- geometrical optics restricted eavesdropping --- secret key distillation --- satellite-to-satellite --- physical layer security --- secret key generation --- injection attacks --- jamming attacks --- pilot randomization --- clock synchronization --- Bayesian statistics --- oblivious transfer --- post-quantum cryptography --- universal composability


Book
Quantum Communication-Celebrating the Silver Jubilee of Teleportation
Authors: ---
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

To celebrate the 25th anniversary of the seminal 1993 quantum teleportation paper, we are pleased to present research works, reviews, and stories about quantum communication, quantum entanglement, and quantum teleportation: (1) How was quantum teleportation invented? (2) Which teleportation experiments were performed at the Sapienza University in Rome? (3) Can we use joint measurements to generate nonclassical correlations? (4) How is classical sampling related to quantum entanglement? (5) How is classical communication related to a special quantum ensemble? (6) How can simplifying a quantum key distribution protocol make it insecure? (7) Can we teleport a two-qubit quantum state using a nonsymmetric channel? This book includes submissions by some of the most prominent quantum teleportation contributors, including Gilles Brassard, Francesco De Martini, Nicolas Gisin, and William K. Wootters, as well as additional researchers, all presenting their up-to-date insights regarding quantum communication.


Book
Quantum Communication-Celebrating the Silver Jubilee of Teleportation
Authors: ---
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

To celebrate the 25th anniversary of the seminal 1993 quantum teleportation paper, we are pleased to present research works, reviews, and stories about quantum communication, quantum entanglement, and quantum teleportation: (1) How was quantum teleportation invented? (2) Which teleportation experiments were performed at the Sapienza University in Rome? (3) Can we use joint measurements to generate nonclassical correlations? (4) How is classical sampling related to quantum entanglement? (5) How is classical communication related to a special quantum ensemble? (6) How can simplifying a quantum key distribution protocol make it insecure? (7) Can we teleport a two-qubit quantum state using a nonsymmetric channel? This book includes submissions by some of the most prominent quantum teleportation contributors, including Gilles Brassard, Francesco De Martini, Nicolas Gisin, and William K. Wootters, as well as additional researchers, all presenting their up-to-date insights regarding quantum communication.


Book
Relativistic Quantum Information
Authors: ---
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Relativistic quantum information is one of the most exciting fields of physics today. Not only does it open possibilities for new forms of computing but it also calls into question the peaceful coexistence between classical space–time and quantum physics with scenarios that reopen the relationships between locality and nonlocality in the foundational structure of physics. Curated by two international experts Ignazio Licata and Fabrizio Tamburini, this volume hosts a selection of particularly significant essays for the new territories, and is dedicated to the 60th anniversary of Prof. Ignazio Licata.


Book
Quantum Communication-Celebrating the Silver Jubilee of Teleportation
Authors: ---
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

To celebrate the 25th anniversary of the seminal 1993 quantum teleportation paper, we are pleased to present research works, reviews, and stories about quantum communication, quantum entanglement, and quantum teleportation: (1) How was quantum teleportation invented? (2) Which teleportation experiments were performed at the Sapienza University in Rome? (3) Can we use joint measurements to generate nonclassical correlations? (4) How is classical sampling related to quantum entanglement? (5) How is classical communication related to a special quantum ensemble? (6) How can simplifying a quantum key distribution protocol make it insecure? (7) Can we teleport a two-qubit quantum state using a nonsymmetric channel? This book includes submissions by some of the most prominent quantum teleportation contributors, including Gilles Brassard, Francesco De Martini, Nicolas Gisin, and William K. Wootters, as well as additional researchers, all presenting their up-to-date insights regarding quantum communication.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by