
Fall 2022 — Issue 3, Volume 2
This is a special issue of 鶹ýAV BITS featuring articles that examine how information theorists are helping the “second quantum revolution” and what potential opportunities in quantum computation lie ahead.
Column article(s)
Scroll to see all columns in this issue.
The security of popular public key-cryptographic protocols, such as RSA, Diffie–Hellman key exchange and the digital signature algorithm (DSA), is endangered by the advent of quantum computers. Shor brought a big breakthrough with his quantum algorithm that can be used to factor an arbitrarily large integer into the product of its prime factors, hence jeopar...
For secure practical systems, quantum key distribution (QKD) must provide high key rates over long distances. Time-entanglement-based QKD promises to increase the secret key rate and distribution distances compared to other QKD implementations. This article describes the major steps in QKD protocols, focusing on the nascent QKD technology based on high-dimen...