2023
DOI: 10.1038/s41598-023-35579-6
|View full text |Cite
|
Sign up to set email alerts
|

Forty thousand kilometers under quantum protection

Abstract: Quantum key distribution (QKD) is a revolutionary cryptography response to the rapidly growing cyberattacks threat posed by quantum computing. Yet, the roadblock limiting the vast expanse of secure quantum communication is the exponential decay of the transmitted quantum signal with the distance. Today’s quantum cryptography is trying to solve this problem by focusing on quantum repeaters. However, efficient and secure quantum repetition at sufficient distances is still far beyond modern technology. Here, we s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(19 citation statements)
references
References 72 publications
0
19
0
Order By: Relevance
“…Building on Quantum Thermodynamics considerations, see Ref. [10], we argue that these natural losses cannot be effectively harvested by Eve. We carry out an illustrative analysis, the results of which show that efficient eavesdropping of natural losses would require the length of the collection apparatus that is impossible to practically realize at the present level of technology.…”
Section: Eavesdropping Of Natural Lossesmentioning
confidence: 90%
See 3 more Smart Citations
“…Building on Quantum Thermodynamics considerations, see Ref. [10], we argue that these natural losses cannot be effectively harvested by Eve. We carry out an illustrative analysis, the results of which show that efficient eavesdropping of natural losses would require the length of the collection apparatus that is impossible to practically realize at the present level of technology.…”
Section: Eavesdropping Of Natural Lossesmentioning
confidence: 90%
“…The line tomography as a constituent part of the key distribution process was originally proposed and thoroughly discussed in Ref. [10]. In this section, we briefly outline its basis and discuss its inalienable components.…”
Section: Line Tomographymentioning
confidence: 99%
See 2 more Smart Citations
“…To put it simply, an object's properties between two or more objects are dependent to each other. Over the years, quantum entanglement has sparked a massive interest of research in numerous fields namely quantum computing, quantum cryptography and quantum teleportation [5][6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%