Write, autoreview, editor, reviewer
3,129
edits
Line 27: | Line 27: | ||
*'''Notations Used:''' | *'''Notations Used:''' | ||
==Relevant Papers== | ==Relevant Papers== | ||
'''Theoretical Papers''' | |||
# [https://arxiv.org/abs/quant-ph/0105032 GC-QDS (2001)] uses [[quantum one way function]] f(); Private keys: classical input x, Public keys: quantum output f(x). '''Requires''' quantum memory, quantum one way function, authenticated quantum and classical channels, [[SWAP Test]] (universal quantum computer). [[ | # [https://arxiv.org/abs/quant-ph/0105032 GC-QDS (2001)] uses [[quantum one way function]] f(); Private keys: classical input x, Public keys: quantum output f(x). | ||
#[https://arxiv.org/abs/quant-ph/0601130 ACJ (2006)] discusses coherent states comparison with a QDS scheme outlined in the last section. Protocol uses the same protocol as (2) but replaces qubits with [[coherent states]], thus replacing SWAP-Test with [[Coherent State Comparison]]. Additionally, it also requires quantum memory, authenticated quantum and classical channels, [[multiports]]. [[ | ##'''Requires''' quantum memory, quantum one way function, authenticated quantum and classical channels, [[SWAP Test]] (universal quantum computer). | ||
#[https://www.sciencedirect.com/science/article/pii/S0030402617308069 SWZY (2017)] Discusses an attack and suggests corrections on existing QDS scheme using single qubit rotations. Protocol uses rotation, qubits, [[one-way hash function]]; Private keys: angle of rotation, Public keys: string of rotated quantum states. '''Requires''' [[random number generator]], [[one-way hash function]], quantum memory, key distribution. | ##Security: [[Information-theoretic]] | ||
[[ | #[https://arxiv.org/abs/quant-ph/0601130 ACJ (2006)] discusses coherent states comparison with a QDS scheme outlined in the last section. | ||
##Protocol uses the same protocol as (2) but replaces qubits with [[coherent states]], thus replacing SWAP-Test with [[Coherent State Comparison]]. Additionally, it also requires quantum memory, authenticated quantum and classical channels, [[multiports]]. | |||
##Security: [[Information-theoretic]] | |||
#[https://www.sciencedirect.com/science/article/pii/S0030402617308069 SWZY (2017)] Discusses an attack and suggests corrections on existing QDS scheme using single qubit rotations. Protocol uses rotation, qubits, [[one-way hash function]]; Private keys: angle of rotation, Public keys: string of rotated quantum states. | |||
##'''Requires''' [[random number generator]], [[one-way hash function]], quantum memory, key distribution. | |||
##'''Security:''' [[Computational]] | |||
'''Experimental Papers''' | |||
#[https://www.nature.com/articles/ncomms2172 CCDAJB (2012)] uses phase encoded coherent states, [[coherent state comparison]] | #[https://www.nature.com/articles/ncomms2172 CCDAJB (2012)] uses phase encoded coherent states, [[coherent state comparison]] | ||
##Loss from multiport=7.5 dB, Length of the key= <math>10^6</math> | ##Loss from multiport=7.5 dB, Length of the key= <math>10^6</math> |