applsci-logo

Journal Browser

Journal Browser

Recent Development and Application of Quantum Communication and Security Protocols, Volume II

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (20 November 2023) | Viewed by 3889

Special Issue Editors


E-Mail Website
Guest Editor
1. Instituto de Telecomunicações, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal
2. Departamento de Matemática, Instituto Superior Técnico, Universidade de Lisboa, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal
Interests: information geometry of Hilbert spaces and many-body physics; topological phases of matter and phase transitions; quantum cryptography; quantum mechanics and gravity; entanglement and indistinguishability; classical, quantum, and total correlations
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
LASIGE, Departamento de Informática, Faculdade de Ciências da Universidade de Lisboa, Campo Grande, 016, 1749-016 Lisboa, Portugal
Interests: quantum computation; computational complexity; cryptography; kolmogorov complexity
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Since the establishment of the famous BB84 quantum key distribution protocol, which overcomes the classical counterparts of general key agreement protocols, quantum communication schemes have become a central topic of research triggered by the second quantum revolution.

At present, quantum communication is one of the most prominent emerging quantum technologies, with new applications continually arising, such as the quantum internet, which will become a reality in the near future. To leverage this new reality, new applications of quantum communication are increasingly being developed. In particular, issues of security and privacy have arisen as crucial requirements in a vast number of different applications. While the challenge of secure communication, which is addressed by various key distribution schemes, is the most prominent issue within quantum cryptography, many other unresolved problems have recently attracted the attention of the scientific community. Quantum cryptography beyond key distribution, addressing privacy requirements, ranges from secure multiparty computations (private data mining, e-voting, etc.) to authentication, blind computation, contract signing protocols, secret sharing, etc. The number of novel applications that are more efficient regarding information transmission and require less-expensive resources is so vast that any attempt at a list would be at risk of being incomplete.

Therefore, theoretical as well as computational and experimental studies and papers on new developments and applications of quantum communications are all welcome in this Special Issue.

Dr. Nikola Paunković
Dr. André Souto
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum communication protocols
  • applications for secure quantum communications
  • key distribution/arrangement schemes
  • secure multi-party computation
  • authentication schemes
  • blind computation
  • contract signing
  • semi-quantum communication applications

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 430 KiB  
Article
A New Security Proof for Twin-Field Quantum Key Distribution (QKD)
by Walter O. Krawec
Appl. Sci. 2024, 14(1), 187; https://doi.org/10.3390/app14010187 - 25 Dec 2023
Cited by 1 | Viewed by 1087
Abstract
Twin-field QKD (TF-QKD) protocols allow for increased key rates over long distances when compared to standard QKD protocols. They are even able to surpass the PLOB bound without the need for quantum repeaters. In this work, we revisit a previous TF-QKD protocol and [...] Read more.
Twin-field QKD (TF-QKD) protocols allow for increased key rates over long distances when compared to standard QKD protocols. They are even able to surpass the PLOB bound without the need for quantum repeaters. In this work, we revisit a previous TF-QKD protocol and derive a new, simple, proof of security for it. We also look at several variants of the protocol and investigate their performance, showing some interesting behaviors due to the asymmetric nature of the protocol. Full article
Show Figures

Figure 1

19 pages, 2388 KiB  
Article
FPLA: A Flexible Physical Layer Authentication Mechanism for Distributing Quantum Keys Securely via Wireless 5G Channels
by Yuxuan Li, Jingyuan Han, Gang Liu, Yi Zhou and Tao Liu
Appl. Sci. 2023, 13(13), 7699; https://doi.org/10.3390/app13137699 - 29 Jun 2023
Cited by 1 | Viewed by 1335
Abstract
Quantum Key Distribution (QKD) is popular for establishing a native secure quantum communication network. However, existing QKD networks are built via classical wired fiber channels; it is difficult to distribute quantum keys directly into mobile phones, and no effective candidate solution is available [...] Read more.
Quantum Key Distribution (QKD) is popular for establishing a native secure quantum communication network. However, existing QKD networks are built via classical wired fiber channels; it is difficult to distribute quantum keys directly into mobile phones, and no effective candidate solution is available yet. This paper presents a novel Flexible Physical Layer Authentication (FPLA) mechanism that exploits the unique characteristic of wireless signals from mobile phones to securely distribute quantum keys via wireless 5G channels. In particular, a 5G Up-Link Sounding Reference Signal (SRS)-based transmission model is developed to capture and extract the unique characteristic, which is then used to distribute quantum keys. Moreover, the model could lose accuracy due to SRS variations introduced by 5G Multiuser Multiple-Input Multiple-Output (MU-MIMO), so a dimensional transformation residual network is designed to classify legitimate and malicious user equipment (UE). An average authentication accuracy of 96.8% is proved by FPLA in multiple experiments in a 3 dB Signal-to-Noise Ratio (SNR) test environment with a training dataset of 300 samples per malicious UE. Simulation results show that FPLA is able to adapt to antenna diversity in 5G MU-MIMO systems. Full article
Show Figures

Figure 1

12 pages, 344 KiB  
Article
An Optical Implementation of Quantum Bit Commitment Using Infinite-Dimensional Systems
by Guang Ping He
Appl. Sci. 2023, 13(13), 7692; https://doi.org/10.3390/app13137692 - 29 Jun 2023
Cited by 1 | Viewed by 836
Abstract
Unconditionally secure quantum bit commitment (QBC) was widely believed to be impossible for more than two decades, but recently, based on an anomalous behavior found in quantum steering, we proposed a QBC protocol which can be unconditionally secure in principle. The protocol requires [...] Read more.
Unconditionally secure quantum bit commitment (QBC) was widely believed to be impossible for more than two decades, but recently, based on an anomalous behavior found in quantum steering, we proposed a QBC protocol which can be unconditionally secure in principle. The protocol requires the use of infinite-dimensional systems, so it may seem less feasible in practice. Here, we propose a quantum optical method based on the Mach–Zehnder interferometer, which gives a very good approximation to such infinite-dimensional systems. Thus, it enables a proof-of-principle experimental implementation of our protocol, which can also serve as a practically secure QBC scheme. Other multi-party cryptographic protocols such as quantum coin tossing can be built upon it too. Our approach also reveals a relationship between infinity and non-locality, which may have an impact on the research of fundamental theories. Full article
Show Figures

Figure 1

Back to TopTop